Sciweavers

223 search results - page 43 / 45
» Cooperative network construction using digital germlines
Sort
View
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
14 years 3 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
CCS
2010
ACM
13 years 8 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
WWW
2006
ACM
14 years 9 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli
JNW
2007
81views more  JNW 2007»
13 years 8 months ago
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...
Hideyuki Takahashi, Yoshikazu Tokairin, Kazuhiro Y...
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...