Sciweavers

3083 search results - page 584 / 617
» Active Peer to Peer
Sort
View
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks
In 1969, Thomas Schelling proposed one of the most cited models in economics to explain how similar people (e.g. people with the same race, education, community) group together in...
Long Vu, Klara Nahrstedt, Matthias Hollick
SAINT
2008
IEEE
14 years 2 months ago
Distributed Sensor Information Management Architecture Based on Semantic Analysis of Sensing Data
In the ubiquitous computing environment, we believe that P2P-based context-aware application utilizing sensing data is important. However, since sensors are not placed under the c...
Tomoya Kawakami, Bich Lam Ngoc Ly, Susumu Takeuchi...
SECON
2008
IEEE
14 years 2 months ago
Cooperative Recovery in Heterogeneous Mobile Networks
Abstract—In multicast/broadcast services over infrastructurebased/cellular wireless networks (e.g. 3G cellular networks, WiMax, DVB), data is transmitted to multiple recipients f...
Kaustubh Sinkar, Amit Jagirdar, Thanasis Korakis, ...
WIMOB
2008
IEEE
14 years 2 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...