Sciweavers

ICUMT
2009
13 years 9 months ago
Some considerations on the design of a P2P infrastructure for massive simulations
Massive Multiuser Virtual Environments (MMVEs) are rapidly expanding both in the number of users and complexity of interactions. Their needs of computational resources offer new ch...
Gennaro Cordasco, Rosario De Chiara, Ugo Erra, Vit...
ICUMT
2009
13 years 9 months ago
Disconnection prediction in mobile P2P networks using publish/subscribe
Massimiliano de Leoni, Massimo Mecella, Paolo Manf...
ICUMT
2009
13 years 9 months ago
Coordinate-based routing: Refining nodeIds in structured peer-to-peer systems
Structured peer-to-peer systems--also known as key-based routing protocols--offer a base for a broad range of applications. In the past, different topology adaptation mechanisms fo...
Fabian Hartmann, Bernhard Heep
ICUMT
2009
13 years 9 months ago
A scalable based multicast model for P2P Conferencing applications
Multicast conferencing is a rapidly-growing area of Internet use. Audio, video and other media such as shared whiteboard data can be distributed efficiently between groups of confe...
Mourad Amad, Zahir Haddad, Lachemi Khenous, Kamal ...
ICUMT
2009
13 years 9 months ago
Joint power control, scheduling and routing for multicast in multihop energy harvesting sensor networks
We consider the problem of joint power control, scheduling and routing in energy harvesting sensor networks allowing for multicast of data generated at the sensor nodes to a set of...
Vinay Joseph, Vinod Sharma, Utpal Mukherji, Manjun...
ICUMT
2009
13 years 9 months ago
Performance of relay-enabled uplink in cellular networks - a flow level analysis
Uplink users in cellular networks, such as UMTS/ HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as ...
Desislava C. Dimitrova, Hans van den Berg, Geert J...
ICUMT
2009
13 years 9 months ago
A Bayesian analysis of Compressive Sensing data recovery in Wireless Sensor Networks
Abstract--In this paper we address the task of accurately reconstructing a distributed signal through the collection of a small number of samples at a data gathering point using Co...
Riccardo Masiero, Giorgio Quer, Michele Rossi, Mic...
ICICS
2009
Springer
13 years 9 months ago
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications. However, current TCG attestation architecture req...
Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei S...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
13 years 9 months ago
Impact of Topology and Shadowing on the Outage Probability of Cellular Networks
This paper proposes an analytical study of the shadowing impact on the outage probability in cellular radio networks. We establish that the downlink other-cell interference factor,...
Jean Marc Kelif, Marceau Coupechoux
ICC
2009
IEEE
126views Communications» more  ICC 2009»
13 years 9 months ago
The Effects of Multi-Layer Traffic on the Survivability of IP-Over-WDM Networks
The survivability of backbone networks to failures is an on-going concern. This paper investigates survivability strategies for IP-over-WDM networks in a multi-layer framework wher...
Peera Pacharintanakul, David Tipper