Sciweavers

1405 search results - page 143 / 281
» Popularity at Minimum Cost
Sort
View
ADHOC
2007
67views more  ADHOC 2007»
15 years 4 months ago
Threshold-related throughput - A new criterion for evaluation of sensor network performance
Energy efficient and power aware protocols are of utmost importance in Sensor Networks. The most popular criteria, so far, for evaluating performance of energy-aware protocols are...
Ilya Ledvich, Adrian Segall
CONCURRENCY
2008
71views more  CONCURRENCY 2008»
15 years 4 months ago
Gossip-based search selection in hybrid peer-to-peer networks
We present GAB, a search algorithm for hybrid P2P networks, that is, networks that search using both flooding and a DHT. GAB uses a gossip-style algorithm to collect global statis...
M. Zaharia, S. Keshav
IJNSEC
2008
126views more  IJNSEC 2008»
15 years 4 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
15 years 4 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
ISCI
2008
96views more  ISCI 2008»
15 years 4 months ago
Fuzzy age-dependent replacement policy and SPSA algorithm based-on fuzzy simulation
An increase in the performance of deteriorating systems can be achieved through the adoption of suitable maintenance policies. One of the most popular maintenance policies is the ...
Jiashun Zhang, Ruiqing Zhao, Wansheng Tang