Sciweavers

8080 search results - page 391 / 1616
» From Computer Networks to Agent Networks
Sort
View
PERCOM
2005
ACM
16 years 4 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
ICDCSW
2006
IEEE
15 years 11 months ago
On the Use of Nodes with Controllable Mobility for Conserving Power in MANETs
We explore the idea of using relay nodes with controllable mobility as intermediate hops for reducing the power consumption in a mobile ad hoc network (MANET). We formulate the re...
Eashwar R. Chittimalla, Aravindhan Venkateswaran, ...
ICDCS
2008
IEEE
15 years 11 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
119
Voted
POLICY
2005
Springer
15 years 10 months ago
Approximating Service Utility from Policies and Value Function Patterns
Service-oriented computing provides the right means for building flexible systems that allow dynamic configuration and on-the-fly composition. In order to realize this vision, ...
Steffen Lamparter, Daniel Oberle, Andreas Eberhart
IMC
2007
ACM
15 years 6 months ago
Issues and etiquette concerning use of shared measurement data
In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the tec...
Mark Allman, Vern Paxson