Sciweavers

92 search results - page 10 / 19
» Centralized Security Labels in Decentralized P2P Networks
Sort
View
PERCOM
2007
ACM
14 years 2 months ago
Decentralized Bootstrapping in Pervasive Applications
Abstract— Deploying world-scale pervasive applications usually requires substantial investments in server infrastructure. A better option is to use P2P techniques, because it dis...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
SIGIR
2003
ACM
14 years 1 months ago
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web
This paper describes a decentralized peer-to-peer model for building a Web crawler. Most of the current systems use a centralized client-server model, in which the crawl is done by...
Aameek Singh, Mudhakar Srivatsa, Ling Liu, Todd Mi...
SSS
2007
Springer
14 years 2 months ago
Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance
In this paper we present a rigorous treatment to structured overlay maintenance in decentralized peerto-peer (P2P) systems subject to various system and network failures. we prese...
Yu Chen, Wei Chen
IJAMC
2008
84views more  IJAMC 2008»
13 years 8 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...