Sciweavers

1574 search results - page 293 / 315
» Efficient QoS Routing
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
14 years 12 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 12 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
145views Education» more  CORR 2008»
14 years 12 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
EOR
2008
73views more  EOR 2008»
14 years 12 months ago
Strategic planning in fractional aircraft ownership programs
In the fractional ownership model, the partial owner of an aircraft is entitled to certain flight hours per year, and the management company is responsible for all the operational...
Yufeng Yao, Özlem Ergun, Ellis Johnson, Willi...
FGCS
2008
90views more  FGCS 2008»
14 years 12 months ago
Powerful resource discovery for Arigatoni overlay network
Arigatoni is a structured multi-layer overlay network providing various services with variable guarantees, and promoting an intermittent participation in the overlay since peers c...
Raphaël Chand, Michel Cosnard, Luigi Liquori