Sciweavers

405 search results - page 36 / 81
» Linking and Messaging from Real Paper in the Paper PDA
Sort
View
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
CCECE
2009
IEEE
15 years 1 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
ICWN
2004
14 years 11 months ago
Efficient Minimum-Cost Bandwidth-Constrained Routing in Wireless Sensor Networks
A critical issue in the design of routing protocols for wireless sensor networks is the efficient utilization of resources such as scarce bandwidth and limited energy supply. Many ...
Maulin Patel, R. Chandrasekaran, S. Venkatesan
TPDS
2010
103views more  TPDS 2010»
14 years 8 months ago
A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
—Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distrib...
Xing Jin, S.-H. Gary Chan, Wan-Ching Wong, Ali C. ...
BIOADIT
2006
Springer
15 years 1 months ago
Proposal and Evaluation of a Cooperative Mechanism for Pure P2P File Sharing Networks
To provide application-oriented network services, a variety of overlay networks are deployed over physical IP networks. Since they share and compete for the same physical network r...
Junjiro Konishi, Naoki Wakamiya, Masayuki Murata