Sciweavers

4218 search results - page 70 / 844
» Complete sets of cooperations
Sort
View
CORR
2008
Springer
91views Education» more  CORR 2008»
13 years 7 months ago
A Distributed MAC Protocol for Cooperation in Random Access Networks
WLAN is one of the most successful applications of wireless communications in daily life because of low cost and ease of deployment. The enabling technique for this success is the ...
Georg Böcherer, Alexandre de Baynast
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 7 months ago
Reputation-Based Attack-Resistant Cooperation Stimulation (RACS) For Mobile Ad hoc Networks
In mobile ad hoc networks (MANET), nodes usually belong to different authorities and pursue different goals. In order to maximize their own performance, nodes in such networks ten...
Anuradha Banerjee, Paramartha Dutta
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 8 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
ICDCS
2007
IEEE
14 years 2 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...
IPTPS
2005
Springer
14 years 1 months ago
Peering Peer-to-Peer Providers
The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distribute...
Hari Balakrishnan, Scott Shenker, Michael Walfish