Sciweavers

1080 search results - page 160 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ICPP
2007
IEEE
15 years 11 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
EGOV
2007
Springer
15 years 11 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
ICNP
2005
IEEE
15 years 10 months ago
Efficient Hop ID based Routing for Sparse Ad Hoc Networks
Routing in mobile ad hoc networks remains as a challenging problem given the limited wireless bandwidth, users’ mobility and potentially large scale. Recently, there has been a ...
Yao Zhao, Bo Li, Qian Zhang, Yan Chen, Wenwu Zhu
ICPADS
2005
IEEE
15 years 10 months ago
An Enhanced Slow-Start Mechanism for TCP Vegas
: In this article, we present a new slow-start variant, which improves the throughput of transmission control protocol (TCP) Vegas. We call this new mechanism Gallop-Vegas because ...
Cheng-Yuan Ho, Yi-Cheng Chan, Yaw-Chung Chen
CIA
2004
Springer
15 years 10 months ago
Towards Monitoring of Group Interactions and Social Roles via Overhearing
We are investigating how to provide intelligent, pervasive support of group of people within so-called “smart environments”. Our current main assumption, based on literature in...
Silvia Rossi, Paolo Busetta