Sciweavers

49 search results - page 9 / 10
» icccn 2008
Sort
View
ICCCN
2008
IEEE
13 years 11 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ICCCN
2008
IEEE
13 years 11 months ago
Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control
—Multicast is attracting a resurgence of interest because it has a potential to address the explosively growing need for efficient streaming of large-volume Internet content. Ho...
Sergey Gorinsky, K. K. Ramakrishnan, Harrick M. Vi...
ICCCN
2008
IEEE
13 years 11 months ago
Iterative Decoding for Redistributing Energy Consumption in Wireless Sensor Networks
— In this paper, we propose a method for desirably redistributing a wireless sensor network’s energy consumption from its sensor nodes (which may have scarce energy resources o...
Robert G. Maunder, Alex S. Weddell, Geoff V. Merre...
ICCCN
2008
IEEE
13 years 11 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar
ICCCN
2008
IEEE
13 years 11 months ago
Localized Bridging Centrality for Distributed Network Analysis
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
Soumendra Nanda, David Kotz