Sciweavers

1123 search results - page 160 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
SOSP
2007
ACM
16 years 1 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
HPCS
2006
IEEE
15 years 10 months ago
Collaborative Agents for Data Dissemination in Wireless Sensor Networks
This paper presents collaborative agents system architecture approach for data dissemination in a wireless sensor network (WSN). This system architecture consists of four layers o...
Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin...
CORR
2008
Springer
212views Education» more  CORR 2008»
15 years 4 months ago
Joint Adaptive Modulation-Coding and Cooperative ARQ for Wireless Relay Networks
This paper presents a cross-layer approach to jointly design adaptive modulation and coding (AMC) at the physical layer and cooperative truncated automatic repeat request (ARQ) pro...
Morteza Mardani, Jalil S. Harsini, Farshad Lahouti...
MOBIHOC
2006
ACM
16 years 4 months ago
Minimizing recovery state In geographic ad-hoc routing
Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use of recovery algorithms when the greedy approach...
Noa Arad, Yuval Shavitt
WELCOM
2001
Springer
132views ECommerce» more  WELCOM 2001»
15 years 8 months ago
Incentives for Sharing in Peer-to-Peer Networks
The recent and unprecedented surge of public interest in peer-to-peer file sharing has led to a variety of interesting research questions. In this paper, we will address the ince...
Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, ...