Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…Our module can describe any peer using different service discovery protocols, as DNS based discovery or Pervasive Discovery Protocol (see Sect. 3.3 and [17]). Furthermore, localization techniques using signal strength provide good privacy and are inexpensive: radio hardware is used not only to establish communications, but also to determine the relative position.…”
Section: Domain Definition Modulementioning
confidence: 93%
See 1 more Smart Citation
“…Our module can describe any peer using different service discovery protocols, as DNS based discovery or Pervasive Discovery Protocol (see Sect. 3.3 and [17]). Furthermore, localization techniques using signal strength provide good privacy and are inexpensive: radio hardware is used not only to establish communications, but also to determine the relative position.…”
Section: Domain Definition Modulementioning
confidence: 93%
“…The type and number of attributes are user-defined, but at least, two should be considered: physical distance and trust value. Besides, other attributes like service information from discovery protocols [17], required credentials, or economic cost, can be considered.…”
Section: Domain Definition Modulementioning
confidence: 99%
“…Two metrics are employed: discovery efficacy (similarly to Campo et al, 2006;Chakraborty et al, 2006), as well as peer exposure. The efficacy of service discovery takes into account both MATCH and ANNOUNCE messages.…”
Section: Simulation Modelmentioning
confidence: 99%
“…Distributed query protocol operate in a purely peer-to-peer fashion; with clients querying the network for servers or with servers advertising their services to the network depending on the specific protocol mechanism [21,3]. These approaches may generate high overheads when compared to service coordinator approaches, as queries and advertisements are directly flooded throughout the network by user agents or service agents.…”
Section: Related Workmentioning
confidence: 99%