Sciweavers

3083 search results - page 572 / 617
» Active Peer to Peer
Sort
View
AINA
2011
IEEE
13 years 1 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
JAMIA
2011
87views more  JAMIA 2011»
13 years 15 days ago
Can poison control data be used for pharmaceutical poisoning surveillance?
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...
NETWORKING
2011
13 years 13 days ago
oBGP: An Overlay for a Scalable iBGP Control Plane
The Internet is organized as a collection of networks called Autonomous Systems (ASes). The Border Gateway Protocol (BGP) is the glue that connects these administrative domains. Co...
Iuniana M. Oprescu, Mickael Meulle, Steve Uhlig, C...
PPOPP
2011
ACM
13 years 13 days ago
Wait-free queues with multiple enqueuers and dequeuers
The queue data structure is fundamental and ubiquitous. Lockfree versions of the queue are well known. However, an important open question is whether practical wait-free queues ex...
Alex Kogan, Erez Petrank
CEC
2011
IEEE
12 years 9 months ago
Accelerating convergence towards the optimal pareto front
—Evolutionary algorithms have been very popular optimization methods for a wide variety of applications. However, in spite of their advantages, their computational cost is still ...
Mohsen Davarynejad, Jafar Rezaei, Jos L. M. Vranck...