Sciweavers

275 search results - page 44 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
ICCCN
2008
IEEE
14 years 4 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
BMCBI
2004
131views more  BMCBI 2004»
13 years 9 months ago
A web services choreography scenario for interoperating bioinformatics applications
Background: Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applic...
Remko de Knikker, Youjun Guo, Jin-long Li, Albert ...
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...
INFOCOM
2008
IEEE
14 years 4 months ago
MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes
—The physical layer of future wireless networks will be based on novel radio technologies such as UWB and MIMO. One of the important capabilities of such technologies is the abil...
Guner D. Celik, Gil Zussman, Wajahat F. Khan, Eyta...
TDSC
2011
13 years 4 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode