Sciweavers

1224 search results - page 188 / 245
» Modeling and performance analysis of BitTorrent-like peer-to...
Sort
View
TIFS
2008
149views more  TIFS 2008»
13 years 9 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
INFOCOM
2003
IEEE
14 years 2 months ago
A Dynamic RWA Algorithm in a Wavelength-Routed All-Optical Network with Wavelength Converters
—Existing research demonstrated that an effective Routing and Wavelength Assignment (RWA) scheme and a wavelength converter placement algorithm are the two primary vehicles for i...
Xiaowen Chu, Bo Li
CONCURRENCY
2008
95views more  CONCURRENCY 2008»
13 years 9 months ago
The File Mover: high-performance data transfer for the grid
The exploration in many scientific disciplines (e.g., High-Energy Physics, Climate Modeling, and Life Sciences) involves the production and the analysis of massive data collection...
Cosimo Anglano, Massimo Canonico
DSN
2006
IEEE
14 years 20 days ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
CONEXT
2010
ACM
13 years 7 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields