Sciweavers

163 search results - page 10 / 33
» Dependability Properties of P2P Architectures
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
JCM
2006
112views more  JCM 2006»
13 years 7 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
CIKM
2010
Springer
13 years 5 months ago
Automatic schema merging using mapping constraints among incomplete sources
Schema merging is the process of consolidating multiple schemas into a unified view. The task becomes particularly challenging when the schemas are highly heterogeneous and autono...
Xiang Li 0002, Christoph Quix, David Kensche, Sand...
IJSNET
2011
110views more  IJSNET 2011»
13 years 2 months ago
Sensor integration for perinatology research
— The numbers of high-risk pregnancies and premature births are increasing due to the steadily higher age at which women get pregnant. The long-term quality of life of the neonat...
Wei Chen, Jun Hu, Sibrecht Bouwstra, Sidarto Bamba...
VR
2007
IEEE
179views Virtual Reality» more  VR 2007»
14 years 1 months ago
On the Characterization of Peer-To-Peer Distributed Virtual Environments
Large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multi-player online games in th...
Silvia Rueda, Pedro Morillo, Juan M. Orduña...