Sciweavers

ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
13 years 11 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ISCC
2008
IEEE
13 years 11 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
ISCC
2008
IEEE
110views Communications» more  ISCC 2008»
13 years 11 months ago
Performance testing of Mobile IPv6 protocol
Mobile IPv6 (MIPv6) protocol is a new protocol designed to support the node mobility ofIPv6 protocol, which is a basic protocol of the next generation Internet. Protocol testing c...
Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin,...
ISCC
2008
IEEE
105views Communications» more  ISCC 2008»
13 years 11 months ago
VoRaQue: Range queries on Voronoi overlays
—This paper presents VoRaQue, a software layer supporting range queries on Voronoi P2P overlays. VoRaQue maps data in a 2-dimensional space. The P2P overlay is defined by links ...
Michele Albano, Laura Ricci, Martina Baldanzi, Ran...
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
13 years 11 months ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...
ISCC
2008
IEEE
130views Communications» more  ISCC 2008»
13 years 11 months ago
A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming
We propose efficient scheduling algorithms for downlink MIMO-CDMA systems using zero forcing beamforming to achieve high system throughput with low computational complexity. Base...
Elmahdi Driouch, Wessam Ajib
ISCC
2008
IEEE
148views Communications» more  ISCC 2008»
13 years 11 months ago
Data collection in sensor networks with data mules: An integrated simulation analysis
Wireless sensor networks (WSNs) have emerged as the enabling technology for a wide range of applications. In the context of environmental monitoring, especially in urban scenarios...
Giuseppe Anastasi, Marco Conti, Mario Di Francesco
ISCC
2008
IEEE
179views Communications» more  ISCC 2008»
13 years 11 months ago
A new approach to content-based file type detection
Mehdi Chehel Amirani, Mohsen Toorani, Ali Asghar B...
ISCC
2008
IEEE
152views Communications» more  ISCC 2008»
13 years 11 months ago
Efficient delivery of MBMS multicast traffic over HSDPA
Multimedia Broadcast/Multicast Service (MBMS) and High-Speed Downlink Packet Access (HSDPA) are two key technologies that constitute a significant step towards the Mobile Broadban...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
ISCC
2008
IEEE
123views Communications» more  ISCC 2008»
13 years 11 months ago
Improving reliability and energy efficiency of disk systems via utilization control
As disk drives become increasingly sophisticated and processing power increases, one of the most critical issues of designing modern disk systems is data reliability. Although num...
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xi...