Results 31 to 40 of about 496,765 (185)

Leader Election for Anonymous Asynchronous Agents in Arbitrary Networks [PDF]

open access: yes, 2012
We study the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical.
Dereniowski, Dariusz, Pelc, Andrzej
core   +2 more sources

Supervised Reinforcement Session Recommendation Model Based on Dual-Graph Convolution

open access: yesIEEE Access, 2023
In the field of session-based recommendation by anonymous sessions, the commonly used supervised learning modeling method has the problem of sub-optimal recommendation.
Shunpan Liang   +2 more
doaj   +1 more source

Peer-to-peer:is deviant behavior the norm on P2P file-sharing networks? [PDF]

open access: yes, 2006
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of scalability concerns and legal issues, such networks are moving away from the semicentralized approach that Napster typifies toward more scalable and ...
Coulson, G.   +3 more
core   +1 more source

Minimising Anonymity Loss in Anonymity Networks under DoS Attacks [PDF]

open access: yes, 2011
Anonymity is a security property of paramount importance as it helps to protect users' privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS) attack, as repeated message retransmission affords more opportunities for attackers to analyse traffic and lower the protocols' privacy. In this
Yang, Mu, Sassone, Vladimiro
openaire   +2 more sources

A Parallelism-Based Approach to Network Anonymization

open access: yes, 2009
Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between
Margasinski, Igor
core   +1 more source

Finding routes in anonymous sensor networks

open access: yes, 2005
We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink.
Akyildiz   +7 more
core   +1 more source

Threshold Anonymous Announcement in VANETs. [PDF]

open access: yes, 2011
Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However,
Chen, LIqun, Ng, Siaw-Lynn, Wang, G.
core   +2 more sources

Anonymous and authenticated routing protocol for mobile ad hoc networks

open access: yesTongxin xuebao, 2009
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc ...
LI Xiao-qing, LI Hui, MA Jan-feng
doaj   +2 more sources

Investigating the Cost of Anonymity on Dynamic Networks

open access: yes, 2015
In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To
Baldoni, Roberto   +1 more
core   +1 more source

RoboCast: Asynchronous Communication in Robot Networks [PDF]

open access: yes, 2010
This paper introduces the \emph{RoboCast} communication abstraction. The RoboCast allows a swarm of non oblivious, anonymous robots that are only endowed with visibility sensors and do not share a common coordinate system, to asynchronously exchange ...
Bouzid, Zohir   +3 more
core   +6 more sources

Home - About - Disclaimer - Privacy