Sciweavers

797 search results - page 119 / 160
» How to Compress Interactive Communication
Sort
View
ICCCN
2008
IEEE
15 years 4 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 4 months ago
A Peer-to-Peer Approach for Remote Rendering and Image Streaming in Walkthrough Applications
— Motivated by the widespread of file and video streaming over peer-to-peer networks, we propose to investigate the design of a peer-to-peer solution for image-based remote walk...
Azzedine Boukerche, Richard Werner Nelem Pazzi
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 4 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ICCCN
2007
IEEE
15 years 4 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
TASE
2007
IEEE
15 years 4 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...