Sciweavers

2074 search results - page 188 / 415
» Using an Object Reference Approach to Distributed Updates
Sort
View
142
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
198
Voted
MDM
2009
Springer
299views Communications» more  MDM 2009»
15 years 10 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
205
Voted
GAMEON
2009
15 years 1 months ago
Analysis of User Trajectories Based on Data Distribution and State Transition: a Case Study with a Massively Multiplayer Online
At present, trajectory data, series of coordinate data traversed by moving objects, can be readily obtained due to the advent of positioning technologies. Clustering of trajectori...
Ruck Thawonmas, Junichi Oda, Kuan-Ta Chen
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
156
Voted
ICDCN
2010
Springer
15 years 2 months ago
K-Directory Community: Reliable Service Discovery in MANET
Abstract. Service discovery in MANET suffers from frequent service unavailability due to failures of service providers or directory nodes. Ensuring network-wide service availabilit...
Vaskar Raychoudhury, Jiannong Cao, Weigang Wu, Yi ...