Sciweavers

6907 search results - page 1209 / 1382
» Securing distributed adaptation
Sort
View
ICC
2008
IEEE
138views Communications» more  ICC 2008»
15 years 4 months ago
Designing File Replication Schemes for Peer-to-Peer File Sharing Systems
—Peer-to-peer (P2P) file sharing systems are becoming increasingly popular due to their flexibility and scalability. We propose a new model to design file replication schemes ...
Jian Ni, Jie Lin, S. J. Harrington, Naveen Sharma
ICDCSW
2008
IEEE
15 years 4 months ago
On the Modeling of Honest Players in Reputation Systems
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on ...
Qing Zhang, Ting Yu
ICDS
2008
IEEE
15 years 4 months ago
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...
Thomas Dreibholz, Erwin P. Rathgeb
INFOCOM
2008
IEEE
15 years 4 months ago
End-to-End Resource Allocation in OFDM Based Linear Multi-Hop Networks
— We study the end-to-end resource allocation in an OFDM based multi-hop network consisting of a one-dimensional chain of nodes including a source, a destination, and multiple re...
Xiaolu Zhang, Wenhua Jiao, Meixia Tao
IROS
2008
IEEE
136views Robotics» more  IROS 2008»
15 years 4 months ago
Enabling autonomous capabilities in underwater robotics
— Underwater operations present unique challenges and opportunities for robotic applications. These can be attributed in part to limited sensing capabilities, and to locomotion b...
Junaed Sattar, Gregory Dudek, Olivia Chiu, Ioannis...
« Prev « First page 1209 / 1382 Last » Next »