Sciweavers

494 search results - page 54 / 99
» The Conference Call Search Problem in Wireless Networks
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya
COCOA
2010
Springer
13 years 7 months ago
Time Optimal Algorithms for Black Hole Search in Rings
In a network environments supporting mobile entities (called robots or agents), a black hole is harmful site that destroys any incoming entity without leaving any visible trace. Th...
Balasingham Balamohan, Paola Flocchini, Ali Miri, ...
AINA
2004
IEEE
14 years 25 days ago
m-Roam: A Service Invocation and Roaming Framework for Pervasive Computing
This paper proposes an architectural framework for integrating services within an enterprise and accessing them from mobile devices in a pervasive-computing environment. Present n...
Alvin Chin, Kostas Kontogiannis
SENSYS
2009
ACM
14 years 3 months ago
Macrodebugging: global views of distributed program execution
Creating and debugging programs for wireless embedded networks (WENs) is notoriously difficult. Macroprogramming is an emerging technology that aims to address this by providing ...
Tamim I. Sookoor, Timothy W. Hnat, Pieter Hooimeij...
ICPADS
2007
IEEE
14 years 3 months ago
A semantic overlay network for unstructured peer-to-peer protocols
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer-to-Peer pro...
Junfeng Xie, Zhenhua Li, Guihai Chen