Sciweavers

4794 search results - page 143 / 959
» Trust-Based Mechanism Design
Sort
View
118
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Fault-Tolerant Wireless Access Network Design for Dual-Homed Users
— In this paper, we study the survivability problem in hierarchical wireless access networks with dual-homed end users, who are connected to two base stations (BSs), a primary BS...
Xiaodong Huang, Jianping Wang, Vinod Vokkarane, Ja...
124
Voted
BERTINORO
2005
Springer
15 years 9 months ago
Design and Analysis of a Bio-inspired Search Algorithm for Peer to Peer Networks
Decentralized peer to peer (p2p) networks like Gnutella are attractive for certain applications because they require no centralized directories and no precise control over network ...
Niloy Ganguly, Lutz Brusch, Andreas Deutsch
124
Voted
AINA
2003
IEEE
15 years 9 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
127
Voted
PUC
2002
91views more  PUC 2002»
15 years 3 months ago
Designing Leisure Applications for the Mundane Car-Commute
: Commuting by car from home to work can be very time consuming. We have conducted a study to explore what people are doing, and want to do, while commuting. People use their time ...
Karl-Petter Ðkesson, Andreas Nilsson
122
Voted
CN
2011
140views more  CN 2011»
14 years 7 months ago
Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures
Nowadays, data storage requirements from end-users are growing, demanding more capacity, more reliability and the capability to access information from anywhere. Cloud storage ser...
Lluis Pamies-Juarez, Pedro García Ló...