Sciweavers

212 search results - page 35 / 43
» A sybilproof distributed identity management for P2P network...
Sort
View
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 8 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
CN
2004
108views more  CN 2004»
13 years 8 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
SIGUCCS
2004
ACM
14 years 2 months ago
A platform independent tool for evaluating performance of computing equipment for a computer laboratory
Designing computing equipment for a computer laboratory is not easy. In a class in a computer laboratory, it is not unusual that all students do the same thing simultaneously. Tre...
Takashi Yamanoue
KIVS
2007
Springer
14 years 2 months ago
Semantic Integration of Identity Data Repositories
Abstract. With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This ...
Christian Emig, Kim Langer, Jürgen Biermann, ...
HCI
2007
13 years 10 months ago
Architectural Backpropagation Support for Managing Ambiguous Context in Smart Environments
Abstract. The evolution to ubiquitous information and communication networks is evident. Technology is emerging that connects everyday objects and embeds intelligence in our enviro...
Davy Preuveneers, Yolande Berbers