Sciweavers

3222 search results - page 28 / 645
» Decentralized Network Analysis: A Proposal
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
GISCIENCE
2010
Springer
230views GIS» more  GISCIENCE 2010»
14 years 12 months ago
Detecting Change in Snapshot Sequences
Wireless sensor networks are deployed to monitor dynamic geographic phenomena, or objects, over space and time. This paper presents a new spatiotemporal data model for dynamic area...
Mingzheng Shi, Stephan Winter
GLOBECOM
2007
IEEE
15 years 6 months ago
Clustered K-Center: Effective Replica Placement in Peer-to-Peer Systems
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
Jian Zhou, Xin Zhang, Laxmi N. Bhuyan, Bin Liu
DEXAW
2003
IEEE
96views Database» more  DEXAW 2003»
15 years 5 months ago
Self-Organizing Resource Allocation for Autonomic Networks
Application-layer networks (ALN) are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual ...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
KESAMSTA
2007
Springer
15 years 6 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada