Sciweavers

71 search results - page 10 / 15
» Demand-Oblivious Routing: Distributed vs. Centralized Approa...
Sort
View
FC
2008
Springer
82views Cryptology» more  FC 2008»
14 years 11 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
SSDBM
2007
IEEE
138views Database» more  SSDBM 2007»
15 years 4 months ago
Reliable Hierarchical Data Storage in Sensor Networks
The ability to provide reliable in-network storage while balancing the energy consumption of individual sensors is a primary concern when deploying a sensor network. The main conc...
Song Lin, Benjamin Arai, Dimitrios Gunopulos
MOBIHOC
2002
ACM
15 years 9 months ago
Approximating minimum size weakly-connected dominating sets for clustering mobile ad hoc networks
We present a series of approximation algorithms for finding a small weakly-connected dominating set (WCDS) in a given graph to be used in clustering mobile ad hoc networks. The st...
Yuanzhu Peter Chen, Arthur L. Liestman
SAC
2010
ACM
14 years 10 months ago
TransPeer: adaptive distributed transaction monitoring for Web2.0 applications
In emerging Web2.0 applications such as virtual worlds or social networking websites, the number of users is very important (tens of thousands), hence the amount of data to manage...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
IMC
2006
ACM
15 years 3 months ago
Towards IP geolocation using delay and topology measurements
We present Topology-based Geolocation (TBG), a novel approach to estimating the geographic location of arbitrary Internet hosts. We motivate our work by showing that 1) existing a...
Ethan Katz-Bassett, John P. John, Arvind Krishnamu...