pc.sagepub.com/cgi/content/abstract/22/3/284 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal...
Wanchun Dou, Jinjun Chen, Jianxun Liu, S. C. Cheun...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
In this paper we present an experimental study conducted in 802.11based mesh networks of three existing rate adaptation algorithms. The aim of this study is twofold. On the one ha...
In this paper we present an integrated view for modeling and reasoning for context applications using OWL DL. In our case study, we describe a task driven approach to model typica...
Anni-Yasmin Turhan, Thomas Springer, Michael Berge...
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...