enter search term and/or author name
The Price of Anonymity: Optimal Consensus Despite Asynchrony, Crash, and Anonymity
François Bonnet, Michel Raynal
Article No.: 23
This article addresses the consensus problem in asynchronous systems prone to process crashes, where additionally the processes are anonymous (they cannot be distinguished one from the other: they have no name and execute the same code). To...
Effective Usage of Computational Trust Models in Rational Environments
Le-Hung Vu, Karl Aberer
Article No.: 24
Computational reputation-based trust models using statistical learning have been intensively studied for distributed systems where peers behave maliciously. However practical applications of such models in environments with both malicious and...
Bird Flight-Inspired Routing Protocol for Mobile Ad Hoc Networks
Sudip Misra, Gopidi Rajesh
Article No.: 25
One of the major challenges in the research of mobile ad hoc networks is designing dynamic, scalable, and low cost (in terms of utilization of resources) routing protocols usable in real-world applications. Routing in ad hoc networks has been...
Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
Yang Xiao, Yanping Zhang, Xiannuan Liang
Article No.: 26
Although previous bio-inspired models have concentrated on invertebrates, such as ants, mammals, such as primates with higher cognitive function, are valuable for modeling the increasingly complex problems in engineering. Understanding...
Scalable Stealth Mode P2P Overlays of Very Small Constant Degree
Márk Jelasity, Vilmos Bilicki
Article No.: 27
P2P technology has recently been adopted by Internet-based malware as a fault tolerant and scalable communication medium. Due to its decentralized and self-organizing nature, P2P malware is harder to detect and block, especially if it utilizes...
Autonomic computing enables computing infrastructures to perform administration tasks with minimal human intervention. This wrap-up paper describes the experience we gained with the design and use of