The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When moving towards fully Peer-to-Peer Virtual Environments (P2P-VE), the amount of network traffic generated at each peer remains a significant concern. Multiplayer Online Games (MOG) are the largest application subset of VEs and have been shown to require high frequency of update messages and minimal network latencies. Yet, this demanding criteria must be balanced with the need to also limit the...
Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion...
Balancing communication workloads is a perennial performance issue in the area of Distributed Virtual Environments (DVE). The stringent time constraints of Multiplayer Online Games (MOG) complicate efforts to effectively distribute the networking load amongst servers. This issue becomes ever more exacting, when we move towards a fully Peer-to-peer virtual world (P2P-VE). We are consequently forced...
Voronoi Diagrams (VD) have recently been proposed as a way to enable Massively Multi-player On-line Games (MMOG) and Virtual Environments (VE) on fully Peer-to-Peer (P2P) network architectures. Using typical two-dimensional varieties, the peers maintain direct single-hop connections to others in the game-world in a scalable manner. However, direct connections do not guarantee the timely delivery of...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping...
Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to an attack called misroutingattack. Packet misrouting disrupts the packet from...
The crux of large scale Application Layer Multicast or Peer-to-Peer streaming systems is how to cope with the inherent dynamics, the reason is that the participating users may join and leave at will. It is even worse for single-tree-based multicast systems, which are preferred due to their efficiency. In these single multicast tree based schemes, userpsilas departure may cause serious service disruption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.