Sciweavers

2584 search results - page 383 / 517
» On the Forward Checking Algorithm
Sort
View
108
Voted
INFOCOM
2010
IEEE
15 years 23 days ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
JCM
2010
126views more  JCM 2010»
15 years 23 days ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
15 years 21 days ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
WINET
2010
142views more  WINET 2010»
15 years 20 days ago
Demand-driven publish/subscribe in mobile environments
—We propose a novel Self-Balancing Supply/Demand (SBSD) reactive MANET protocol. Our algorithm dynamically discovers publications matching specified subscriptions by controlled f...
Aris M. Ouksel, Doug Lundquist
106
Voted
CJ
2010
87views more  CJ 2010»
15 years 19 days ago
Resource-Aware Multimedia Content Delivery: A Gambling Approach
In this paper, we propose a resource-aware solution to achieving reliable and scalable stream diffusion in a probabilistic model, i.e., where communication links and processes are...
Mouna Allani, Benoît Garbinato, Fernando Ped...