Results 31 to 40 of about 496,765 (185)
Leader Election for Anonymous Asynchronous Agents in Arbitrary Networks [PDF]
We study the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical.
Dereniowski, Dariusz, Pelc, Andrzej
core +2 more sources
Supervised Reinforcement Session Recommendation Model Based on Dual-Graph Convolution
In the field of session-based recommendation by anonymous sessions, the commonly used supervised learning modeling method has the problem of sub-optimal recommendation.
Shunpan Liang +2 more
doaj +1 more source
Peer-to-peer:is deviant behavior the norm on P2P file-sharing networks? [PDF]
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of scalability concerns and legal issues, such networks are moving away from the semicentralized approach that Napster typifies toward more scalable and ...
Coulson, G. +3 more
core +1 more source
Minimising Anonymity Loss in Anonymity Networks under DoS Attacks [PDF]
Anonymity is a security property of paramount importance as it helps to protect users' privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS) attack, as repeated message retransmission affords more opportunities for attackers to analyse traffic and lower the protocols' privacy. In this
Yang, Mu, Sassone, Vladimiro
openaire +2 more sources
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between
Margasinski, Igor
core +1 more source
Finding routes in anonymous sensor networks
We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink.
Akyildiz +7 more
core +1 more source
Threshold Anonymous Announcement in VANETs. [PDF]
Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However,
Chen, LIqun, Ng, Siaw-Lynn, Wang, G.
core +2 more sources
Anonymous and authenticated routing protocol for mobile ad hoc networks
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc ...
LI Xiao-qing, LI Hui, MA Jan-feng
doaj +2 more sources
Investigating the Cost of Anonymity on Dynamic Networks
In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To
Baldoni, Roberto +1 more
core +1 more source
RoboCast: Asynchronous Communication in Robot Networks [PDF]
This paper introduces the \emph{RoboCast} communication abstraction. The RoboCast allows a swarm of non oblivious, anonymous robots that are only endowed with visibility sensors and do not share a common coordinate system, to asynchronously exchange ...
Bouzid, Zohir +3 more
core +6 more sources

