Sciweavers

421 search results - page 58 / 85
» Optimal Trust Network Analysis with Subjective Logic
Sort
View
SPAA
2004
ACM
14 years 29 days ago
Improved combination of online algorithms for acceptance and rejection
Given two admission control algorithms that are cA-acceptcompetitive and cR-reject-competitive respectively, we give two ways to make an algorithm that is simultaneously O(cA)acce...
David P. Bunde, Yishay Mansour
IMC
2003
ACM
14 years 24 days ago
Virtual landmarks for the internet
Internet coordinate schemes have been proposed as a method for estimating minimum round trip time between hosts without direct measurement. In such a scheme, each host is assigned...
Liying Tang, Mark Crovella
IWCMC
2010
ACM
13 years 9 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
MOBIHOC
2008
ACM
14 years 7 months ago
Cooperative transmit-power estimation under wireless fading
We study blind estimation of transmission power of a node based on received power measurements obtained under wireless fading. Specifically, the setup consists of a set of monitor...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
SIGCOMM
2009
ACM
14 years 2 months ago
Modeling energy efficiency in wireless internet communication
For wireless mobile Internet users the length of the battery life is one of the most important performance factors. The energy efficiency of the data transmission over radio is a ...
Enrico Rantala, Arto Karppanen, Seppo Granlund, Pa...