Sciweavers

270 search results - page 38 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
SUTC
2006
IEEE
14 years 2 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
HUC
2000
Springer
14 years 7 days ago
Event-Driven, Personalizable, Mobile Interactive Spaces
Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
Theo Kanter
ISCC
2003
IEEE
14 years 1 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
14 years 3 months ago
Equitable partitioning policies for robotic networks
Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Alessandro Arsie, Emilio Frazzoli, F...
INFOCOM
2009
IEEE
14 years 3 months ago
The Impact of Mobility on Gossip Algorithms
—We analyze how node mobility can influence the convergence time of averaging gossip algorithms on networks. Our main result is that even a small number of fully mobile nodes ca...
Anand D. Sarwate, Alexandros G. Dimakis