Sciweavers

ICDCSW
2005
IEEE
14 years 1 months ago
QoS Oriented Dynamic Replica Cost Model for P2P Computing
Replication on multiple nodes is an effective way to improve the availability in the P2P or grid environment. It is difficult to determine how many replicas can fulfill the user r...
Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi
ICDCSW
2005
IEEE
14 years 1 months ago
Publisher Mobility in Distributed Publish/Subscribe Systems
The decoupling of producers and consumers in the publish/subscribe paradigm lends itself well to the support of mobile users who roam about the environment with intermittent netwo...
Vinod Muthusamy, Milenko Petrovic, Dapeng Gao, Han...
ICDCSW
2005
IEEE
14 years 1 months ago
Context Adaptation of the Communication Stack
José Mocito, Liliana Rosa, Nuno Almeida, Hu...
ICDCSW
2005
IEEE
14 years 1 months ago
Self-Stabilization in Self-Organized Multihop Wireless Networks
Nathalie Mitton, Eric Fleury, Isabelle Guér...
ICDCSW
2005
IEEE
14 years 1 months ago
Using a Fairness Monitoring Service to Improve Load-Balancing in DSR
Many routing protocols for MANETs do not promote a balanced use of resources among the participating nodes, since they are designed to optimize other criteria, such as the number ...
Hugo Miranda, Luís Rodrigues
ICDCSW
2005
IEEE
14 years 1 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
ICDCSW
2005
IEEE
14 years 1 months ago
Using Fine-Grained Infrared Positioning to Support the Surface-Based Activities of Mobile Users
Knowledge of the fine-grained location and orientation of devices on a surface can be used to enhance the surface-based computing tasks of mobile users in the home and workplace....
Albert Krohn, Michael Beigl, Mike Hazas, Hans-Wern...
ICDCSW
2005
IEEE
14 years 1 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
ICDCSW
2005
IEEE
14 years 1 months ago
DistScroll - A New One-Handed Interaction Device
We present an interaction device for navigating data structures or browsing menus using only one hand. It is especially designed for situations in which the user wears gloves that...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
ICDCSW
2005
IEEE
14 years 1 months ago
On Optimal TTL Sequence-Based Route Discovery in MANETs
In on-demand multi-hop routing protocols for MANETs such as DSR and AODV, a fundamental requirement for peer-to-peer connectivity is to discover routes to a remote node via flood...
Dimitrios Koutsonikolas, Saumitra M. Das, Himabind...