Sciweavers

1927 search results - page 366 / 386
» An Access Control Model for Location based Services
Sort
View
ICDCSW
2006
IEEE
14 years 1 months ago
Fuzzy Trust for Peer-to-Peer Systems
Peer-to-peer (P2P) systems are based upon the cooperative interactions of member peers. Typically, peers are both autonomous and self-interested, meaning that there is no hierarch...
Nathan Griffiths, Kuo-Ming Chao, Muhammad Younas
SAINT
2006
IEEE
14 years 1 months ago
Fair Overload Handling Using Proof-of-Work Functions
Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to...
Sebastian Golze, Gero Mühl
MOBICOM
1999
ACM
13 years 12 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
SBBD
2004
128views Database» more  SBBD 2004»
13 years 9 months ago
Integrating Heterogeneous Data Sources in Flexible and Dynamic Environments
Flexible and dynamic environments are characterized by high independence from connection participants, low control over available services and high tolerance to communication fail...
Angelo Brayner, Marcelo Meirelles
LEGE
2003
94views Education» more  LEGE 2003»
13 years 9 months ago
Dynamic Learning Agents and Enhanced Presence on the Grid
Human Learning on the Grid will be based on the synergies between advanced software and Human agents. These synergies will be possible to the extent that conversational protocols ...
Stefano A. Cerri, Marc Eisenstadt, Clement Jonquet