Sciweavers

729 search results - page 130 / 146
» Assurance of dynamic adaptation in distributed systems
Sort
View
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ICC
2007
IEEE
150views Communications» more  ICC 2007»
14 years 2 months ago
Utility-based Optimal Rate Allocation for Heterogeneous Wireless Multicast
Abstract— Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks when multicast receivers in the same...
Amr M. Mohamed, Hussein M. Alnuweiri
AINA
2006
IEEE
14 years 1 months ago
Peer-Tree: A Hybrid Peer-to-Peer Overlay for Service Discovery
Efficient service discovery in dynamic, crossorganizational VO is one of the challenge aspects in ChinaGrid. Network overlay and search algorithms are two important considerations...
Jing Tie, Hai Jin, Shengli Li, Xuanhua Shi, Hanhua...
IJCAI
1997
13 years 9 months ago
Middle-Agents for the Internet
Like middle-men in physical commerce, middleagents support the flow of information in electronic commerce, assisting in locating and connecting the ultimate information provider ...
Keith Decker, Katia P. Sycara, Mike Williamson
IPPS
2007
IEEE
14 years 1 months ago
Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks
: Peer-to-Peer (P2P) reputation systems are needed to evaluate the trustworthiness of participating peers and to combat selfish and malicious peer behaviors. The reputation system ...
Runfang Zhou, Kai Hwang