Sciweavers

17582 search results - page 3311 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
152
Voted
ICC
2008
IEEE
138views Communications» more  ICC 2008»
15 years 10 months ago
Designing File Replication Schemes for Peer-to-Peer File Sharing Systems
—Peer-to-peer (P2P) file sharing systems are becoming increasingly popular due to their flexibility and scalability. We propose a new model to design file replication schemes ...
Jian Ni, Jie Lin, S. J. Harrington, Naveen Sharma
P2P
2008
IEEE
15 years 9 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
114
Voted
WCNC
2008
IEEE
15 years 9 months ago
Fluid Model of the Outage Probability in Sectored Wireless Networks
— We establish a closed form formula of the other-cell interference factor f for omni-directional and sectored cellular networks, as a function of the location of the mobile. Tha...
Jean Marc Kelif, Marceau Coupechoux, Philippe Godl...
132
Voted
WCNC
2008
IEEE
15 years 9 months ago
Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks
—We present link-diversity routing, a routing paradigm that achieves high path resilience in mobile ad hoc networks. Link-diversity routing chooses each hop of a packet’s route...
Vincent Lenders, Rainer Baumann
ACSAC
2007
IEEE
15 years 9 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
« Prev « First page 3311 / 3517 Last » Next »