Sciweavers

3222 search results - page 28 / 645
» Decentralized Network Analysis: A Proposal
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
13 years 9 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
GLOBECOM
2007
IEEE
14 years 3 months ago
Clustered K-Center: Effective Replica Placement in Peer-to-Peer Systems
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
Jian Zhou, Xin Zhang, Laxmi N. Bhuyan, Bin Liu
DEXAW
2003
IEEE
96views Database» more  DEXAW 2003»
14 years 2 months ago
Self-Organizing Resource Allocation for Autonomic Networks
Application-layer networks (ALN) are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual ...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
KESAMSTA
2007
Springer
14 years 2 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada