— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
: In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. T...
—In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a ...
—Understanding the communication behavior and network resource usage of parallel applications is critical to achieving high performance and scalability on systems with tens of th...
Ron Brightwell, Kevin T. Pedretti, Kurt B. Ferreir...
—Ubiquitous and pervasive computing envisions context-aware systems that gather real world information from many fixed and mobile microchips and sensors integrated in everyday o...
—The modeling of energy components in Wireless Sensor Network (WSN) simulation is important for obtaining realistic lifetime predictions and ensuring the faithful operation of en...
Geoff V. Merrett, Alex S. Weddell, A. P. Lewis, Ni...
Abstract—Many next-generation Internet architectures propose advanced packet processing functions in the data path of the network. Such “services” are typically performed on ...
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...