Sciweavers

1184 search results - page 176 / 237
» Nearness relations and topology
Sort
View
EPEW
2007
Springer
14 years 2 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
ICOIN
2007
Springer
14 years 2 months ago
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Construction of overlay networks without any consideration of real network topologies causes inefficient routing in peer-to-peer networks. This paper presents the design and evalua...
Kunwoo Park, Sangheon Pack, Taekyoung Kwon
IPCCC
2006
IEEE
14 years 2 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
VTC
2006
IEEE
153views Communications» more  VTC 2006»
14 years 2 months ago
Ordinal MDS-Based Localization for Wireless Sensor Networks
— There are various applications in wireless sensor networks which require knowing the relative or actual position of the sensor nodes. Recently, there have been different locali...
Vijayanth Vivekanandan, Vincent W. S. Wong
ASPDAC
2006
ACM
95views Hardware» more  ASPDAC 2006»
14 years 2 months ago
Physical design implementation of segmented buses to reduce communication energy
Abstract— The amount of energy consumed for interconnecting the IP-blocks is increasing significantly due to the suboptimal scaling of long wires. To limit this energy penalty, ...
Jin Guo, Antonis Papanikolaou, Pol Marchal, Franck...