Sciweavers

2162 search results - page 327 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
EWSN
2006
Springer
15 years 9 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...
MSWIM
2009
ACM
15 years 4 months ago
HUBCODE: message forwarding using hub-based network coding in delay tolerant networks
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...
Shabbir Ahmed, Salil S. Kanhere
GLOBECOM
2009
IEEE
15 years 4 months ago
An Auction-Based Incentive Mechanism for Non-Altruistic Cooperative ARQ via Spectrum-Leasing
— We propose and analyze a novel decentralized mechanism that motivates otherwise non-cooperative stations to participate as relays in cooperative ARQ protocol. Cooperation incen...
Igor Stanojev, Osvaldo Simeone, Umberto Spagnolini...
P2P
2009
IEEE
167views Communications» more  P2P 2009»
15 years 4 months ago
ID Repetition in Kad
ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...