Sciweavers

21 search results - page 1 / 5
» Secure Routing Based on Social Similarity in Opportunistic N...
Sort
View
ESA
2011
Springer
257views Algorithms» more  ESA 2011»
12 years 5 months ago
Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks
We study and characterize social-aware forwarding protocols in opportunistic networks and we derive bounds on the expected message delivery time for two different routing protocol...
Josep Díaz, Alberto Marchetti-Spaccamela, D...
INFOCOM
2010
IEEE
13 years 4 months ago
PeopleRank: Social Opportunistic Forwarding
— In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes t...
Abderrahmen Mtibaa, Martin May, Christophe Diot, M...
ESAS
2007
Springer
13 years 9 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
SBBD
2007
165views Database» more  SBBD 2007»
13 years 7 months ago
Peer-to-Peer Information Search
We consider the network structure and query processing capabilities of social communities like bookmarks and photo sharing communities such as del.icio.us or flickr. A common fea...
Sebastian Michel, Josiane Xavier Parreira
CVPR
2009
IEEE
15 years 26 days ago
Monitoring, Recognizing and Discovering Social Networks
This work addresses the important problem of the discovery and analysis of social networks from surveillance video. A computer vision approach to this problem is made possible b...
Ting Yu, Ser Nam Lim, Kedar A. Patwardhan, Nils Kr...