Sciweavers

2269 search results - page 54 / 454
» Query Incentive Networks
Sort
View
IWSOS
2009
Springer
14 years 4 months ago
Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Mohamed Karim Sbai, Chadi Barakat
INFOCOM
2007
IEEE
14 years 4 months ago
A Multipath Background Network Architecture
— Background transfers, or transfers that humans do not actively wait on, dominate the Internet today. In today’s best-effort Internet, background transfers can interfere with ...
Ravi Kokku, Aniruddha Bohra, Samrat Ganguly, Arun ...
EUC
2007
Springer
14 years 4 months ago
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main ...
Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashra...
AINA
2007
IEEE
13 years 12 months ago
Cross Layer Routing for Multihop Cellular Networks
Abstract— We propose a unified cross layer routing protocol with multiple constraints for CDMA multihop cellular networks (MCN). Multiple constraints are imposed on intermediate...
Govindan Kannan, Shabbir N. Merchant, Uday B. Desa...
ICASSP
2011
IEEE
13 years 1 months ago
Social norm and long-run learning in peer-to-peer networks
We start by formulating the resource sharing in peer-to-peer (P2P) networks as a random-matching gift-giving game, where self-interested peers aim at maximizing their own long-ter...
Yu Zhang, Mihaela van der Schaar