At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
This paper discusses the application of distributed constraint optimization to coordination in disaster management situations under sub-optimal network conditions. It presents an ...
Robert N. Lass, Joseph B. Kopena, Evan Sultanik, D...
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Cloud Computing (CC) is characterized by dynamically scalable and often virtualized resources that are provided as a service over the Internet. To date, no generally agreed scheme...
Michele Amoretti, Maria Chiara Laghi, Fabio Tasson...
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...