Sciweavers

131 search results - page 17 / 27
» Incorporating Trust in Network Virtualization
Sort
View
WINE
2005
Springer
123views Economy» more  WINE 2005»
15 years 3 months ago
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Abstract. As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the r...
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, We...
MOBIHOC
2006
ACM
15 years 9 months ago
Minimizing recovery state In geographic ad-hoc routing
Geographic ad hoc networks use position information for routing. They often utilize stateless greedy forwarding and require the use of recovery algorithms when the greedy approach...
Noa Arad, Yuval Shavitt
POPL
1998
ACM
15 years 1 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
SIGGRAPH
1999
ACM
15 years 2 months ago
Real-Time Acoustic Modeling for Distributed Virtual Environments
Realistic acoustic modeling is essential for spatializing sound in distributed virtual environments where multiple networked users move around and interact visually and aurally in...
Thomas A. Funkhouser, Patrick Min, Ingrid Carlbom
COMSWARE
2006
IEEE
15 years 3 months ago
Exploiting multi-channel clustering for power efficiency in sensor networks
Sensor networks typically comprise of a number of inexpensive small devices with processing, communication and sensing abilities that collaborate to perform a common task. Sensor d...
Ashima Gupta, Chao Gui, Prasant Mohapatra