Sciweavers

602 search results - page 76 / 121
» Passive User Integration in Social Networking Services
Sort
View
ISCC
2008
IEEE
15 years 4 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 4 months ago
Optimising Radio Access in a Heterogeneous Wireless Network Environment
—A variety of wireless network technologies have been developed and deployed, including GSM, UMTS, WiFi and WiMAX. The advantages of having an integrated heterogeneous wireless n...
Weizhi Luo, Eliane L. Bodanese
GLOBECOM
2010
IEEE
14 years 7 months ago
Modeling and Analysis for Reactive-Decision Spectrum Handoff in Cognitive Radio Networks
This paper investigates how to characterize the effect of multiple spectrum handoff delay on the extended data delivery time of the secondary users' connections in cognitive r...
Chung-Wei Wang, Li-Chun Wang, Fumiyuki Adachi
ECOWS
2009
Springer
15 years 29 days ago
Service-Based Semantic Search in P2P Systems
—Recently, Semantic Web Services have been increasingly adopted to search, access and manipulate information made available from autonomous and heterogeneous systems interacting ...
Devis Bianchini, Valeria De Antonellis, Michele Me...
ICSOC
2009
Springer
14 years 7 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...