To solve the scalability issue of ad hoc network, a new cluster maintenance protocol is proposed. Clusters may change dynamically, reflecting the mobility of the underlying networ...
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
We research whether the inclusion of information about an information user's social environment and his position in the social network of his peers leads to an improval in sea...
Sebastian Marius Kirsch, Melanie Gnasa, Armin B. C...
The location-sensing technology is a core technology of location-based services and applications. In this paper, we present a location-sensing method, called as cell-based positio...