Sciweavers

480 search results - page 56 / 96
» Anonymous Transactions in Computer Networks
Sort
View
LCN
2008
IEEE
14 years 3 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
BROADNETS
2007
IEEE
14 years 3 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
IROS
2008
IEEE
181views Robotics» more  IROS 2008»
14 years 3 months ago
Scalable Bayesian human-robot cooperation in mobile sensor networks
— In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Humancompute...
Frédéric Bourgault, Aakash Chokshi, ...
SEMWEB
2004
Springer
14 years 2 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
DCOSS
2010
Springer
13 years 9 months ago
Self-stabilizing Synchronization in Mobile Sensor Networks with Covering
Synchronization is widely considered as an important service in distributed systems which may simplify protocol design. Phase clock is a general synchronization tool that provides ...
Joffroy Beauquier, Janna Burman