Sciweavers

1080 search results - page 188 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ISCC
2006
IEEE
133views Communications» more  ISCC 2006»
15 years 3 months ago
Choosing Weights for IP Network Dimensioning Optimization
Often in Internet Protocol (IP) networks, links are assigned weights, and traffic demands are routed along shortest paths. Hence, these link weights are the parameters which dete...
Olivier Klopfenstein, Sebastien Mamy
79
Voted
EXPDB
2006
ACM
15 years 3 months ago
A Reproducible Benchmark for P2P Retrieval
With the growing popularity of information retrieval (IR) in distributed systems and in particular P2P Web search, a huge number of protocols and prototypes have been introduced i...
Thomas Neumann, Matthias Bender, Sebastian Michel,...
IWCMC
2006
ACM
15 years 3 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
INFOCOM
2005
IEEE
15 years 3 months ago
Exploiting heterogeneity in sensor networks
—The presence of heterogeneous nodes (i.e., nodes with an enhanced energy capacity or communication capability) in a sensor network is known to increase network reliability and l...
Mark D. Yarvis, Nandakishore Kushalnagar, Harkirat...
69
Voted
MINENET
2005
ACM
15 years 3 months ago
Experiences with a continuous network tracing infrastructure
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data ...
Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin...