Sciweavers

3305 search results - page 139 / 661
» Can we Rely on SQL
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CN
2006
99views more  CN 2006»
15 years 3 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CN
2006
89views more  CN 2006»
15 years 3 months ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
CORR
2004
Springer
104views Education» more  CORR 2004»
15 years 3 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
ANTSW
2010
Springer
15 years 1 months ago
Positional Communication and Private Information in Honeybee Foraging Models
Honeybees coordinate foraging efforts across vast areas through a complex system of advertising and recruitment. One mechanism for coordination is the waggle dance, a movement patt...
Peter Bailis, Radhika Nagpal, Justin Werfel