Sciweavers

21 search results - page 4 / 5
» Designing incentives for peer-to-peer routing
Sort
View
MOBICOM
2006
ACM
14 years 4 months ago
OURS: optimal unicast routing systems in non-cooperative wireless networks
We propose novel solutions for unicast routing in wireless networks consisted of selfish terminals: in order to alleviate the inevitable over-payment problem (and thus economic i...
Weizhao Wang, Xiang-Yang Li, Stephan Eidenbenz, Yu...
IWSOS
2009
Springer
14 years 5 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
NSDI
2008
14 years 1 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
CHI
2007
ACM
14 years 11 months ago
EMI: a system to improve and promote the use of public transportation
This paper presents a project to improve the public transportation in the city of Huajuapan de Le?n, Oaxaca, M?xico. Interactive Multimedia Stations (EMI, for its Spanish acronym)...
Tonatzin Yutzin Baños, Emmanuel Aquino, Fer...
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 4 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...