Sciweavers

208 search results - page 39 / 42
» Randomized Distance-Vector Routing Protocol
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
KAIS
2008
151views more  KAIS 2008»
13 years 7 months ago
Expertise-based peer selection in Peer-to-Peer networks
Abstract. Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining th...
Peter Haase, Ronny Siebes, Frank van Harmelen
WD
2010
13 years 5 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
REALWSN
2010
13 years 2 months ago
An Experimental Study on IEEE 802.15.4 Multichannel Transmission to Improve RSSI-Based Service Performance
Abstract. In Wireless Sensor Networks (WSNs) the majority of the devices provide access to the Received Signal Strength Indicator (RSSI), which has been used as a means to enable d...
Andrea Bardella, Nicola Bui, Andrea Zanella, Miche...
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 7 months ago
Dependability in Aggregation by Averaging
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...