Sciweavers

27 search results - page 2 / 6
» iscc 2008
Sort
View
ISCC
2008
IEEE
13 years 12 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
13 years 12 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
13 years 12 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
13 years 12 months ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...
ISCC
2008
IEEE
110views Communications» more  ISCC 2008»
13 years 12 months ago
Performance testing of Mobile IPv6 protocol
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin,...