Sciweavers

92 search results - page 7 / 19
» Centralized Security Labels in Decentralized P2P Networks
Sort
View
CCGRID
2003
IEEE
14 years 23 days ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
NOSSDAV
2005
Springer
14 years 29 days ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
CCGRID
2006
IEEE
14 years 1 months ago
Simple Locality-Aware Co-allocation in Peer-to-Peer Supercomputing
With current grid middleware, it is difficult to deploy distributed supercomputing applications that run concurrently on multiple resources. As current grid middleware systems ha...
Niels Drost, Rob van Nieuwpoort, Henri E. Bal
CCGRID
2003
IEEE
14 years 23 days ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...
CSREASAM
2006
13 years 8 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp