Many industrial applications rely on sensors and sensor networks residing on machinery, transport containers or in the environment. For distributed processes in such domains the s...
Manabu Isomura, Till Riedel, Christian Decker, Mic...
Reputation-based mechanisms and policies are vulnerable to the submission of untruthful ratings. In this paper, we define and analyze a game-theoretic model that captures the dyn...
Network coordinates, which embed network distance measurements in a coordinate system, were introduced as a method for determining the proximity of nodes for routing table updates...
Peter R. Pietzuch, Jonathan Ledlie, Michael Mitzen...
Abstract— E-mail is one of the most popular Internet applications. Unfortunately, the server-centric architecture of today’s commercial solutions inherently limits availability...
Computing and telecommunications are maturing, and Ubiquitous computing has become quite interesting as a new environment in which to seek new services. The goal of Ubiquitous com...