Sciweavers

119 search results - page 14 / 24
» Designing Network Protocols for Good Equilibria
Sort
View
CISS
2007
IEEE
14 years 1 months ago
Routing Strategies in Broadband Multihop Cooperative Networks
— Two fundamental properties of wireless networks, the variable link quality and the broadcast nature of the transmission, have often been ignored in the design of routing protoc...
Bo Gui, Lin Dai, Leonard J. Cimini Jr.
NSDI
2008
13 years 9 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
SIGCOMM
1996
ACM
13 years 11 months ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
MOBIHOC
2008
ACM
14 years 6 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 10 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...