The Ensemble methodology supports the design and implementation of message passing applications, particularly MPMD and those demanding irregular or partially regular process topol...
Most of currently available content-based publish-subscribe systems that were designed to operate in large scale, wired scenarios, build their routing infrastructure as a set of b...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
In this paper we introduce a function-defined extension of Virtual Reality Modeling Language where analytical formulas are used for defining geometry and appearance of 3D shapes. ...
DHTs can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio betwee...