Sciweavers

6894 search results - page 174 / 1379
» On network interference management
Sort
View
TKDE
2010
272views more  TKDE 2010»
15 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
APNOMS
2007
Springer
15 years 11 months ago
A Density Based Clustering for Node Management in Wireless Sensor Network
This paper represents a new clustering approach for wireless sensor network. It is a decentralized algorithm having the topology control information in each sensor node. A post lea...
Md. Obaidur Rahman, Byung Goo Choi, Muhammad Mosta...
CIKM
2009
Springer
15 years 11 months ago
On optimising personal network size to manage information flow
PN refer to the set of ties a specific individual has with other people. There is significant variation in the size of an individual’s PN and this paper explores the effect o...
Yu-En Lu, Sam Roberts, Tammy M. K. Cheng, Robin Du...
SENSYS
2006
ACM
15 years 10 months ago
Using grid technologies to optimise a wireless sensor network for flood management
Danny Hughes, Phil Greenwood, Barry Porter, Paul G...
INFOCOM
2009
IEEE
15 years 11 months ago
TDMA Scheduling in Long-Distance WiFi Networks
—In the last few years, long-distance WiFi networks have been used to provide Internet connectivity in rural areas. The strong requirement to support real-time applications in th...
Debmalya Panigrahi, Bhaskaran Raman