scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2006"


Journal ArticleDOI
TL;DR: The novel functionalities and current research challenges of the xG networks are explained in detail, and a brief overview of the cognitive radio technology is provided and the xg network architecture is introduced.

6,608 citations


Journal ArticleDOI
TL;DR: The aim is to present a structured framework for electric utilities who plan to utilize new communication technologies for automation and hence, to make the decision-making process more effective and direct.

509 citations


Journal ArticleDOI
TL;DR: This work presents a taxonomy of reputation system components, their properties, and describes research that exemplifies compromises made to deliver a useable, implementable system.

475 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a survey of peer-to-peer (P2P) search methods, including simple key lookup, keyword lookup, information retrieval and data management, and early efforts to optimize range, multiattribute, join and aggregation queries over P2P indexes.

428 citations


Journal ArticleDOI
TL;DR: A technique for efficiently storing user reputation information in a completely decentralized manner is described, and it is shown how this information can be used to efficiently identify non-cooperative users in NICE.

271 citations


Journal ArticleDOI
TL;DR: This work systematically characterize prior definitions for the properties of heavy-hitter traffic in four different dimensions, and observes that there are strong correlations between some combinations of size, rate and burstiness.

184 citations


Journal ArticleDOI
TL;DR: Although this study does not fully solve the FastTrack puzzle, it nevertheless leads to a coherent description of FastTrack and its overlay, and leverages the measurement results to set forth a number of key principles for the design of a successful unstructured P2P overlay.

170 citations


Journal ArticleDOI
TL;DR: A number of measures that compare rankings of search engine results are presented, which apply to five queries that were monitored daily for two periods of 14 or 21 days each.

163 citations


Journal ArticleDOI
TL;DR: An overview of reputation-based trust management techniques and a comprehensive comparison of their performance against various classes of collusive peer behavior are provided.

128 citations


Journal ArticleDOI
TL;DR: The purpose of this paper is to discuss decentralized resource allocation in a self-organizing network from the viewpoint of potential games, focusing on power allocation and scheduling in a congested distributed network such as a wireless ad hoc network.

120 citations


Journal ArticleDOI
TL;DR: This work analyzes a 1356-million-packet trace from a sizeable MMORPG called ShenZhou Online, the first formal analysis of MMORPG server traces, and finds that MMORPG and FPS games are similar in that they both generate small packets and require low bandwidths.

Journal ArticleDOI
TL;DR: The underlying idea is that, with the proposed nonlinear packet dropping function, packet dropping becomes gentler than RED at light traffic load but more aggressive at heavy load.

Journal ArticleDOI
TL;DR: A partitioning-based algorithm is presented that schedules the movements of MEs in a sensor network such that there is no data loss due to buffer overflow and the proposed Partitioning-Based Scheduling (PBS) algorithm performs well in terms of reducing the minimum required ME speed to prevent data loss.

Journal ArticleDOI
TL;DR: This paper presents a model to analyze the throughput performance of an EDCA WLAN as a function of these parameters, and finds out that, surprisingly, one of the EDCA parameters, the AIFS, is not used in the optimal configuration.

Journal ArticleDOI
TL;DR: This paper studies the impact of concavity on the allocation and presents computational methods for obtaining fair allocations in a general topology, based on a dual Lagrangian approach and on Semi-Definite Programming.

Journal ArticleDOI
TL;DR: An extensive simulation study to investigate the performance of dynamic overlay routing, and compares two overlay routing algorithms, reactive and proactive, with shortest-path native routing and proposes a hybrid routing scheme that combines the best features of the previous two algorithms.

Journal ArticleDOI
TL;DR: This work considers an IEEE 802.11 based wireless LAN where an access point is used to connect a fixed number of users to the Web or to a shared file system, and develops a queueing model, which provides the mean session delay in the presence of short-lived flows.

Journal ArticleDOI
TL;DR: This is the first work that addresses how to handle dynamic flash crowds in a structured P2P network and shows that the SWOP network can efficiently deliver popular, possibly dynamic, objects to all the requesting nodes.

Journal ArticleDOI
TL;DR: This work presents a decentralized scheme that organizes the MSNs into an appropriate overlay structure that is particularly beneficial for real-time applications and iteratively modifies the overlay tree using localized transformations to adapt with changing distribution of MSNs and clients, as well as network conditions.

Journal ArticleDOI
TL;DR: An approximate model for computing the distribution of link duration under a Random Waypoint (RWP) mobility model is developed, and it is demonstrated that the path duration distribution converges to an exponential distribution with increasing number of hops.

Journal ArticleDOI
TL;DR: Deering et al. as mentioned in this paper proposed a Universal Multicast (UM) framework, along with a set of mechanisms and protocols, to provide ubiquitous multicast delivery service on the Internet.

Journal ArticleDOI
TL;DR: It is shown, using partial views obtained from the Internet, that the Internet's resiliency to a deliberate attack is much smaller than previously found, and its teachability is also somewhat lower under random failures.

Journal ArticleDOI
TL;DR: This paper focuses on optimizing handover decisions in heterogeneous environments, where the user has a choice among different mobile networks and access points, and proposes a flexible, integrated approach for context management, which can adapt in several ways.

Journal ArticleDOI
TL;DR: This work considers a wireless sensor network with both wireless link impairments and node failures, and models key aspects of the network including forward error correction, path diversity, and the multi-hop nature of ad-hoc networks.

Journal ArticleDOI
TL;DR: An efficient data-collection scheme that can be used for event monitoring or network-wide diagnosis, and imposes little processing and storage overhead, allowing for the sensor networking paradigm of 'dumb sensor, smart sink' which enables economical deployment of large-scale sensor networks.

Journal ArticleDOI
TL;DR: An assessment of the communication overheads of IPsec and the feasibility of deploying it on handheld devices for the UMTS architecture is evaluated and a quantitive analysis based on a detailed simulation model of an IPsec enabled handheld device is conducted.

Journal ArticleDOI
TL;DR: Simulation results confirm the capability of the proposed algorithms to effectively detect malicious peers and isolate them from the system, hence reducing the amount of inauthentic uploads, increasing peers' satisfaction, and preserving network resources.

Journal ArticleDOI
TL;DR: Simulation results with MER show that accounting for location errors significantly improves the performance of geographic routing, and it is shown that in a mobile environment MER performs better than existing approaches.

Journal ArticleDOI
TL;DR: This study proposes a mechanism which can both tolerate and locate data inconsistency failures in sensor networks and demonstrates the ability of the mechanism to identify faulty nodes efficiently and with limited overheads.

Journal ArticleDOI
TL;DR: A light-weight BU protocol with high security strength is proposed, which makes use of public key certificate-based strong authentication technique and takes advantage of IPv6 address format and home link's jurisdiction over the addresses it assigns, and thereby solves the difficult certificate issuing and management problem presented in the previous public key certificates-based solutions via trust delegation.