Sciweavers

3305 search results - page 138 / 661
» Can we Rely on SQL
Sort
View
EDBTW
2004
Springer
14 years 3 months ago
Semantic Query Routing and Processing in P2P Database Systems: The ICS-FORTH SQPeer Middleware
Abstract. Peer-to-peer (P2P) computing is currently attracting enormous attention. In P2P systems a very large number of autonomous computing nodes (the peers) pool together their ...
Giorgos Kokkinidis, Vassilis Christophides
ISER
2004
Springer
158views Robotics» more  ISER 2004»
14 years 3 months ago
Collective Inspection of Regular Structures using a Swarm of Miniature Robots
We present a series of experiments concerned with the inspection of regular, engineered structures carried out using swarms of five to twenty autonomous, miniature robots, solely ...
Nikolaus Correll, Alcherio Martinoli
ICDCS
2000
IEEE
14 years 2 months ago
Scheduling with Global Information in Distributed Systems
Buffered coscheduling is a distributed scheduling methodology for time-sharing communicating processes in a distributed system, e.g., PC cluster. The principle mechanisms involved...
Fabrizio Petrini, Wu-chun Feng
IH
1998
Springer
14 years 2 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
14 years 2 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith