Sciweavers

1674 search results - page 112 / 335
» On the Optimality of the ARQ-DDF Protocol
Sort
View
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
INFOCOM
2009
IEEE
14 years 3 months ago
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks
—Distributed object search is the primary function of Peer-to-Peer (P2P) file sharing system to locate and transfer the file. The predominant search schemes in unstructured P2P...
Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki
IWCMC
2006
ACM
14 years 2 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...
GLOBECOM
2007
IEEE
14 years 3 months ago
Resource Allocation for Amplify-and-Forward Relay Networks with Differential Modulation
— The optimum resource allocation is an important method to improve the error performance and energy efficiency of wireless relay networks. In this paper, we consider the resour...
Woong Cho, Liuqing Yang
INFOCOM
2007
IEEE
14 years 3 months ago
DEFT: Distributed Exponentially-Weighted Flow Splitting
— Network operators control the flow of traffic through their networks by adapting the configuration of the underlying routing protocols. For example, they tune the integer li...
Dahai Xu, Mung Chiang, Jennifer Rexford