Sciweavers

638 search results - page 3 / 128
» Mobility Management Using P2P Techniques in Wireless Network...
Sort
View
SASO
2008
IEEE
14 years 22 days ago
WSN and P2P: A Self-Managing Marriage
Wireless sensor networks are designed for a very wide, yet specific, purpose. Their components have processing and power limitations. Due to these limitations, decisions by runni...
Gustavo Gutierrez, Boris Mejías, Peter Van ...
GI
2004
Springer
13 years 11 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics ...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
TKDE
2010
272views more  TKDE 2010»
13 years 4 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
PERCOM
2004
ACM
14 years 6 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 10 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...