Sciweavers

551 search results - page 52 / 111
» Preventing existence
Sort
View
MOBICOM
2009
ACM
15 years 6 months ago
Impact of mobility on spectrum sensing in cognitive radio networks
In cognitive radio networks (CRNs), spectrum sensing is key to opportunistic spectrum access while preventing any unacceptable interference to primary users’ communications. Alt...
Alexander W. Min, Kang G. Shin
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 6 months ago
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks
—The recent surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have s...
Xuhua Ding, Wei Yu, Ying Pan
ICCCN
2008
IEEE
15 years 6 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang
ICDIM
2008
IEEE
15 years 6 months ago
A framework for RESTful object exchange through schematized XML (unRESTricted)
Client-server architectures with clients on divergent platforms are in need of services that serve a high level of interoperability and a loose binding. It should be prevented tha...
Barbara Van De Keer, Dieter Van Rijsselbergen, Eri...
IPPS
2008
IEEE
15 years 6 months ago
An effective pointer replication algorithm in P2P networks
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Jian Zhou, Laxmi N. Bhuyan, Anirban Banerjee