Sciweavers

702 search results - page 69 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
ISCC
2007
IEEE
109views Communications» more  ISCC 2007»
15 years 4 months ago
Embeddable Overlay Networks
—The accuracy of network coordinate (NC) which is comprehensively applied is suffering seriously from Triangle Inequality Violations (TIVs). A novel approach - Embeddable Overlay...
Eng Keong Lua, Timothy G. Griffin
P2P
2005
IEEE
137views Communications» more  P2P 2005»
15 years 3 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
DRM
2004
Springer
15 years 3 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman
ERCIMDL
2006
Springer
161views Education» more  ERCIMDL 2006»
15 years 1 months ago
Scalable Semantic Overlay Generation for P2P-Based Digital Libraries
The advent of digital libraries along with the tremendous growth of digital content call for distributed and scalable approaches for managing vast data collections. Peer-to-peer (P...
Christos Doulkeridis, Kjetil Nørvåg, ...
MOBIHOC
2006
ACM
15 years 9 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...