Sciweavers

126 search results - page 21 / 26
» Centrality in Policy Network Drawings
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Risk sensitive optimal control framework applied to delay tolerant networks
—Epidemics dynamics can describe the dissemination of information in delay tolerant networks, in peer to peer networks and in content delivery networks. The control of such dynam...
Eitan Altman, Veeraruna Kavitha, Francesco De Pell...
IPPS
2009
IEEE
14 years 2 months ago
BarterCast: A practical approach to prevent lazy freeriding in P2P networks
A well-known problem in P2P systems is freeriding, where users do not share content if there is no incentive to do so. In this paper, we distinguish lazy freeriders that are merel...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
GLOBECOM
2008
IEEE
14 years 1 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
HPDC
2006
IEEE
14 years 1 months ago
Improving I/O Performance of Clustered Storage Systems by Adaptive Request Distribution
We develop an adaptive load distribution protocol for logical volume I/O workload in clustered storage systems. It exploits data redundancy among decentralized storage servers to ...
Changxun Wu, Randal C. Burns
SPC
2005
Springer
14 years 29 days ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...