Sciweavers

671 search results - page 123 / 135
» Trust evaluation in ad-hoc networks
Sort
View
HIPC
2004
Springer
14 years 4 months ago
An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks
In this paper we describe a novel strategy for carrying out lookups in Chord-based peer-to-peer (P2P) networks, wherein nodes are assumed to behave selfishly. This is in contrast ...
Rohit Gupta, Arun K. Somani
JUCS
2010
217views more  JUCS 2010»
13 years 9 months ago
The 3A Personalized, Contextual and Relation-based Recommender System
Abstract: This paper discusses the 3A recommender system that targets CSCL (computersupported collaborative learning) and CSCW (computer-supported collaborative work) environments....
Sandy El Helou, Christophe Salzmann, Denis Gillet
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 5 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
14 years 4 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
CONCURRENCY
2008
80views more  CONCURRENCY 2008»
13 years 11 months ago
Robust incentives via multi-level Tit-for-Tat
Much work has been done to address the need for incentive models in real deployed peer-to-peer networks. In this paper, we discuss problems found with the incentive model in a lar...
Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei D...