Sciweavers

49 search results - page 9 / 10
» icccn 2008
Sort
View
ICCCN
2008
IEEE
14 years 1 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ICCCN
2008
IEEE
14 years 1 months ago
Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control
—Multicast is attracting a resurgence of interest because it has a potential to address the explosively growing need for efficient streaming of large-volume Internet content. Ho...
Sergey Gorinsky, K. K. Ramakrishnan, Harrick M. Vi...
ICCCN
2008
IEEE
14 years 1 months ago
Iterative Decoding for Redistributing Energy Consumption in Wireless Sensor Networks
— In this paper, we propose a method for desirably redistributing a wireless sensor network’s energy consumption from its sensor nodes (which may have scarce energy resources o...
Robert G. Maunder, Alex S. Weddell, Geoff V. Merre...
ICCCN
2008
IEEE
14 years 1 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar
ICCCN
2008
IEEE
14 years 1 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz