Sciweavers

3222 search results - page 56 / 645
» Decentralized Network Analysis: A Proposal
Sort
View
SIGMETRICS
2002
ACM
114views Hardware» more  SIGMETRICS 2002»
13 years 8 months ago
Search and replication in unstructured peer-to-peer networks
Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applications because they require no centralized directories and no precise contro...
Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenke...
EICS
2009
ACM
14 years 3 months ago
Social network analysis and interactive device design analysis
What methods can we use to help understand why users adopt certain use strategies, and how can we evaluate designs to anticipate and perhaps positively modify how users are likely...
Harold W. Thimbleby, Patrick Oladimeji
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 9 months ago
Signing a Linear Subspace: Signature Schemes for Network Coding
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, netw...
Dan Boneh, David Freeman, Jonathan Katz, Brent Wat...
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
14 years 9 months ago
Distributed deviation detection in sensor networks
Sensor networks have recently attracted much attention, because of their potential applications in a number of different settings. The sensors can be deployed in large numbers in ...
Themistoklis Palpanas, Dimitris Papadopoulos, Vana...
ADHOC
2008
146views more  ADHOC 2008»
13 years 9 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi