Sciweavers

7133 search results - page 1369 / 1427
» Communication algorithms with advice
Sort
View
P2P
2008
IEEE
102views Communications» more  P2P 2008»
14 years 3 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....
P2P
2008
IEEE
14 years 3 months ago
On the Impact of Greedy Strategies in BitTorrent Networks: The Case of BitTyrant
The success of BitTorrent has fostered the development of variants to its basic components. Some of the variants adopt greedy approaches aiming at exploiting the intrinsic altruis...
Damiano Carra, Giovanni Neglia, Pietro Michiardi
WIMOB
2008
IEEE
14 years 3 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
COLCOM
2007
IEEE
14 years 3 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
GLOBECOM
2007
IEEE
14 years 3 months ago
Beamforming with Limited Feedback in Amplify-and-Forward Cooperative Networks
— A relay selection approach has previously been shown to outperform repetition-based scheduling for both amplify-and-forward (AF) and decode-and-forward (DF) cooperative network...
Yi Zhao, Raviraj Adve, Teng Joon Lim
« Prev « First page 1369 / 1427 Last » Next »