Sciweavers

671 search results - page 90 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 6 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal
ICDCSW
2011
IEEE
13 years 11 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
EPEW
2008
Springer
15 years 1 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
EPEW
2007
Springer
15 years 6 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...