Sciweavers

8080 search results - page 333 / 1616
» From Computer Networks to Agent Networks
Sort
View
154
Voted
DSN
2007
IEEE
15 years 8 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...
DIS
2009
Springer
15 years 8 months ago
Discovering Influential Nodes for SIS Models in Social Networks
We address the problem of efficiently discovering the influential nodes in a social network under the susceptible/infected/susceptible (SIS) model, a diffusion model where nodes ar...
Kazumi Saito, Masahiro Kimura, Hiroshi Motoda
IICS
2010
Springer
15 years 8 months ago
Self-Organizing Ant-based Information Gossiping Algorithm for P2P Networks
They appeared in our life only few years ago and now they are everywhere: computers have become ubiquitous and, almost, irreplaceable. Classical ways of creating, managing and exch...
Christophe Guéret, Nicolas Monmarché...
APPT
2005
Springer
15 years 10 months ago
SIP-Based Adaptive Multimedia Transmissions for Wired and Wireless Networks
SIP (Session Initiation Protocol) is a signaling protocol standardized by IETF, aiming to manage the multimedia transmission sessions among different parties. This paper illustrate...
Weijia Jia, Man-Ching Yuen
149
Voted
AP2PC
2004
Springer
15 years 10 months ago
Semantic Overlay Networks for P2P Systems
In a peer-to-peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding t...
Arturo Crespo, Hector Garcia-Molina