Sciweavers

1807 search results - page 244 / 362
» Resilient Overlay Networks
Sort
View
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
15 years 10 months ago
Signing a Linear Subspace: Signature Schemes for Network Coding
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, netw...
Dan Boneh, David Freeman, Jonathan Katz, Brent Wat...
EWSN
2010
Springer
15 years 7 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
INFOCOM
2009
IEEE
15 years 4 months ago
Delivery Properties of Human Social Networks
—The recently proposed Pocket Switched Network paradigm takes advantage of human social contacts to opportunistically create data paths over time. We examine how effective such a...
Nishanth Sastry, Karen R. Sollins, Jon Crowcroft
EUROPAR
2009
Springer
15 years 4 months ago
Uniform Sampling for Directed P2P Networks
Selecting a random peer with uniform probability across a peer-to-peer (P2P) network is a fundamental function for unstructured search, data replication, and monitoring algorithms....
Cyrus P. Hall, Antonio Carzaniga
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...