Sciweavers

1923 search results - page 234 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
MOBIHOC
2008
ACM
15 years 9 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
IJNSEC
2007
157views more  IJNSEC 2007»
14 years 10 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
ICCSA
2005
Springer
15 years 3 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
COMPLEX
2009
Springer
15 years 1 months ago
Capturing Internet Traffic Dynamics through Graph Distances
Studies of the Internet have typically focused either on the routing system, i.e. the paths chosen to reach a given destination, or on the evolution of traffic on a physical link. ...
Steve Uhlig, Bingjie Fu, Almerima Jamakovic
MA
2010
Springer
172views Communications» more  MA 2010»
14 years 8 months ago
On Monte Carlo methods for Bayesian multivariate regression models with heavy-tailed errors
We consider Bayesian analysis of data from multivariate linear regression models whose errors have a distribution that is a scale mixture of normals. Such models are used to analy...
Vivekananda Roy, James P. Hobert