Sciweavers

240 search results - page 5 / 48
» Malicious Users in Unstructured Networks
Sort
View
IAT
2006
IEEE
14 years 1 months ago
A Multi-agent Mechanism for Topology Balancing in Unstructured P2P Networks
Unstructured P2P networks can grow in an ad-hoc and give rise to scale-free graphs where most of the nodes form clusters or hubs around few resourceful nodes. This leads to conges...
Prithviraj Dasgupta
INFOCOM
2010
IEEE
13 years 5 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
CSE
2009
IEEE
14 years 2 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
INFOCOM
2009
IEEE
14 years 2 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
JSAC
2008
116views more  JSAC 2008»
13 years 7 months ago
Stability and Efficiency of Unstructured File Sharing Networks
We propose two unstructured file sharing games, unilateral and bilateral unstructured file sharing games, to study the interaction among self-interested players (users) of unstruct...
Honggang Zhang, Giovanni Neglia, Donald F. Towsley...