Sciweavers

4218 search results - page 223 / 844
» Complete sets of cooperations
Sort
View
INFOCOM
2007
IEEE
15 years 7 months ago
Limiting Sybil Attacks in Structured P2P Networks
— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...
INFOCOM
2007
IEEE
15 years 7 months ago
Low-Power Distributed Event Detection in Wireless Sensor Networks
Abstract—In this paper we address the problem of energyefficient event detection in wireless sensor networks (WSNs). Duty cycling is a fundamental approach to conserving energy i...
Yanmin Zhu, Yunhao Liu, Lionel M. Ni, Z. Zhang
89
Voted
VTC
2007
IEEE
15 years 7 months ago
A Low-Complexity Scheduling for Turbo Equalization with Turbo Decoding
— A novel scheduling for turbo equalization with turbo decoding is proposed. The use of turbo codes associated to turbo equalizers has been frequently investigated in the literat...
André Fonseca dos Santos, Wolfgang Rave, Ge...
120
Voted
ATAL
2007
Springer
15 years 6 months ago
The effect of task and environment factors on M.A.S. coordination and reorganization
Research on organization of Multi-Agent Systems (M.A.S.) has shown that by adapting its organization, a M.A.S. is better able to operate in dynamic environments. In this paper we ...
Mattijs Ghijsen, Wouter N. H. Jansweijer, Bob J. W...
123
Voted
ATAL
2007
Springer
15 years 6 months ago
An adversarial environment model for bounded rational agents in zero-sum interactions
Multiagent environments are often not cooperative nor collaborative; in many cases, agents have conflicting interests, leading to adversarial interactions. This paper presents a ...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...