Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 64May, 2014
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:1389-1286
Reflects downloads up to 25 Nov 2024Bibliometrics
Skip Table Of Content Section
article
3D P2P overlay over MANETs

We study the challenging problems of the mismatch between the overlay and the physical network and the resilience of the overlay structure in peer-to-peer (P2P) protocols over a mobile ad hoc network (MANET). Existing P2P protocols have used inflexible ...

article
Address-free contention in wireless access networks with common control channel for throughput improvement

In wireless local area network (WLAN) with common control channel (CCC), where the spectrum bandwidth is divided into two separate channels for access control and data transmission, concurrent transmissions of control and data frames can improve the ...

article
Reducing power consumption in backbone IP networks through table lookup bypass

We study the possibility of bypassing the table lookup capability of router linecards to save energy in IP networks. Differently from previous works, the table lookup operation is bypassed independently for each linecard. We first present a model for ...

article
Midgar: Generation of heterogeneous objects interconnecting applications. A Domain Specific Language proposal for Internet of Things scenarios

Smart Objects and Internet of Things are two ideas that describe the future. The interconnection of objects can make them intelligent or expand their intelligence. This is achieved by a network that connects all the objects in the world. A network where ...

article
Enhancing secure access to sensor data with user privacy support

With the development of solutions like 6LoWPAN, the implementation of IP technology in sensor devices is already a reality. Therefore, sensors can be natively integrated in the Internet, becoming globally addressable by any other Internet-connected ...

article
Subcarrier and power allocation for OFDMA-based multicast cellular networks using a coalitional game

The subcarrier and power allocation problem for orthogonal frequency-division multiple access (OFDMA)-based multicast cellular networks is investigated in this paper. Due to the intrinsic heterogeneity of the channel gains experienced by different ...

article
An adaptive elliptical anomaly detection model for wireless sensor networks

Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such as farms, forests and water and electricity networks. However, the restricted energy resources of the network impede the collection of raw monitoring ...

article
DNStamp: Short-lived trusted timestamping

Trusted timestamping consists in proving that certain data existed at a particular point in time. Existing timestamping methods require either a centralized and dedicated trusted service or the collaboration of other participants using the timestamping ...

article
An intelligent path recommendation protocol (ICOD) for VANETs

This work introduces a novel, intelligent, real-time, distributed, and flexible path recommendation protocol. We refer to the introduced protocol as an Intelligent path recommendation protocol (ICOD). This protocol aims to find the best path towards ...

article
Self-tuned distributed monitoring of multi-channel wireless networks using Gibbs sampler

Wireless side monitoring employing distributed sniffers has been shown to complement wired side monitoring using Simple Network Management Protocol (SNMP) and base station logs, since it reveals detailed PHY and MAC behaviors, as well as timing ...

article
Lightweight collaborative key establishment scheme for the Internet of Things

This work addresses new security issues in the Internet of Things (IoT). The heterogeneous nature of IoT communications and imbalance in resource capabilities between IoT entities make it challenging to provide the required end-to-end secured ...

article
Estimating human trajectories and hotspots through mobile phone data

Nowadays, the huge worldwide mobile-phone penetration is increasingly turning the mobile network into a gigantic ubiquitous sensing platform, enabling large-scale analysis and applications. Recently, mobile data-based research reached important ...

article
Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networks

As new link technologies and sub-networks proliferate and evolve, a large number of TCP variants have been developed for different types of the network environments. They can lead to major performance gains by taking advantage of local characteristics ...

article
Tracking freeriders in gossip-based content dissemination systems

Gossip-based protocols have proven very efficient for disseminating high-bandwidth content such as video streams in a peer-to-peer fashion. However, for the protocols to work, nodes are required to collaborate by devoting a fraction of their upload ...

article
Design and analysis of a frame-oriented dynamic bandwidth allocation scheme for triple-play services over EPONs

Ethernet Passive Optical Networks (EPONs) are regarded as an important technology for current access networks. However, EPONs perform poorly in differentiated service environments, and may therefore fail to meet the Quality of Service (QoS) demands of ...

article
Enhancing wireless networks with caching: Asymptotic laws, sustainability & trade-offs

We investigate on the sustainability of multihop wireless communications in the context of Information-Centric Networks, when content is replicated in caches over the network. The problem is cast in a flat wireless network for a given content popularity ...

article
CommonFinder: A decentralized and privacy-preserving common-friend measurement method for the distributed online social networks

Distributed social networks have been proposed as alternatives for offering scalable and privacy-preserving online social communication. Recommending friends in the distributed social networks is an important topic. We propose CommonFinder, a ...

article
Review Article: Lifetime and availability of data stored on a P2P system: Evaluation of redundancy and recovery schemes

This paper studies the performance of Peer-to-Peer storage and backup systems (P2PSS). These systems are based on three pillars: data fragmentation and dissemination among the peers, redundancy mechanisms to cope with peers churn and repair mechanisms ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.