Sciweavers

1877 search results - page 199 / 376
» Network Locality at the Scale of Processes
Sort
View
ICCCN
2008
IEEE
15 years 11 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ICIP
2002
IEEE
15 years 9 months ago
Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks
— A fast scheme for wavelet-domain interpolation of lost image blocks in wireless image transmission is presented in this paper. The algorithm is designed to be compatible with t...
Shantanu Rane, Jeremiah Remus, Guillermo Sapiro
INFOCOM
2002
IEEE
15 years 9 months ago
Analysis of Measured Single-Hop Delay from an Operational Backbone Network
— We measure and analyze the single-hop packet delay through operational routers in a backbone IP network. First we present our delay measurements through a single router. Then w...
Konstantina Papagiannaki, Sue B. Moon, Chuck Frale...
IPSN
2007
Springer
15 years 10 months ago
Robust system multiangulation using subspace methods
Sensor location information is a prerequisite to the utility of most sensor networks. In this paper we present a robust and low-complexity algorithm to self-localize and orient se...
Joshua N. Ash, Lee C. Potter
125
Voted
CN
2010
120views more  CN 2010»
15 years 4 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan