Sciweavers

450 search results - page 56 / 90
» Reliable Communication over Partially Authenticated Networks
Sort
View
P2P
2003
IEEE
100views Communications» more  P2P 2003»
14 years 1 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
ICC
2007
IEEE
14 years 2 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska
ICC
2007
IEEE
340views Communications» more  ICC 2007»
14 years 2 months ago
A Decentralized Positioning Method for Wireless Sensor Networks Based on Weighted Interpolation
— A decentralized sensor positioning algorithm is proposed using an adaptive weighted-interpolation method. The proposed method utilizes in-network processing among sensors to co...
Chin-Liang Wang, Yao-Win Hong, Yu-Sheng Dai
WSNA
2003
ACM
14 years 1 months ago
Analysis on the redundancy of wireless sensor networks
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain l...
Yong Gao, Kui Wu, Fulu Li
INFOCOM
2009
IEEE
14 years 2 months ago
On the Effectiveness of Measurement Reuse for Performance-Based Detouring
— For both technological and economic reasons, the default path between two end systems in the wide-area Internet can be suboptimal. This observation has motivated a number of sy...
David R. Choffnes, Fabian E. Bustamante