Sciweavers

3305 search results - page 139 / 661
» Can we Rely on SQL
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
13 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CN
2006
99views more  CN 2006»
13 years 10 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
CN
2006
89views more  CN 2006»
13 years 10 months ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
CORR
2004
Springer
104views Education» more  CORR 2004»
13 years 10 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
ANTSW
2010
Springer
13 years 8 months ago
Positional Communication and Private Information in Honeybee Foraging Models
Honeybees coordinate foraging efforts across vast areas through a complex system of advertising and recruitment. One mechanism for coordination is the waggle dance, a movement patt...
Peter Bailis, Radhika Nagpal, Justin Werfel