Sciweavers

900 search results - page 111 / 180
» Design of a Robust Search Algorithm for P2P Networks
Sort
View
CCS
2009
ACM
14 years 2 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
EUROPAR
2007
Springer
14 years 2 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
JCDL
2009
ACM
102views Education» more  JCDL 2009»
14 years 2 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson
ACMSE
2004
ACM
14 years 1 months ago
Distributed robotic target acquisition using Bluetooth communication
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, ...
IJSNET
2007
95views more  IJSNET 2007»
13 years 7 months ago
On extracting consistent graphs in wireless sensor networks
: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (gra...
Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu J. ...