Sciweavers

168 search results - page 8 / 34
» The price of selfish routing
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
14 years 11 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
TWC
2010
14 years 4 months ago
Pi: a practical incentive protocol for delay tolerant networks
Delay Tolerant Networks (DTNs) are a class of networks characterized by lack of guaranteed connectivity, typically low frequency of encounters between DTN nodes and long propagatio...
Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen...
INFOCOM
2009
IEEE
15 years 4 months ago
Shadow Prices vs. Vickrey Prices in Multipath Routing
Parthasarathy Ramanujam, Zongpeng Li, Lisa Higham
TON
2008
155views more  TON 2008»
14 years 9 months ago
A comparative analysis of server selection in content replication networks
Server selection plays an essential role in content replication networks, such as peer-to-peer (P2P) and content delivery networks (CDNs). In this paper, we perform an analytical i...
Tao Wu, David Starobinski
108
Voted
TWC
2008
111views more  TWC 2008»
14 years 9 months ago
A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
Abstract-- Multiuser diversity gains can be achieved by assigning channels to users with better channel quality in multiuser systems. To avoid the extensive information exchange re...
Dandan Wang, Cristina Comaniciu, Hlaing Minn, Naof...