Sciweavers

2584 search results - page 383 / 517
» On the Forward Checking Algorithm
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
JCM
2010
126views more  JCM 2010»
14 years 8 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
14 years 8 months ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
WINET
2010
142views more  WINET 2010»
14 years 8 months ago
Demand-driven publish/subscribe in mobile environments
—We propose a novel Self-Balancing Supply/Demand (SBSD) reactive MANET protocol. Our algorithm dynamically discovers publications matching specified subscriptions by controlled f...
Aris M. Ouksel, Doug Lundquist
CJ
2010
87views more  CJ 2010»
14 years 8 months ago
Resource-Aware Multimedia Content Delivery: A Gambling Approach
In this paper, we propose a resource-aware solution to achieving reliable and scalable stream diffusion in a probabilistic model, i.e., where communication links and processes are...
Mouna Allani, Benoît Garbinato, Fernando Ped...