Sciweavers

663 search results - page 100 / 133
» From P2P to reliable semantic P2P systems
Sort
View
HUC
2007
Springer
14 years 1 months ago
Exploiting Social Interactions in Mobile Systems
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...
SAC
2009
ACM
14 years 2 months ago
Multi-agent system adaptation in a peer-to-peer scenario
From a system's perspective as opposed to an individual agent perspective, MAS adaptation is now becoming an important topic, since it can help to obtain expected outcomes ...
Jordi Campos Miralles, Maite López-Sá...
ISPDC
2006
IEEE
14 years 1 months ago
Using Overlay Networks to Build Operating System Services for Large Scale Grids
Using grid resources to execute scientific applications requiring a large amount of computing power is attractive but not easy from the user point of view. Vigne is a grid operati...
Emmanuel Jeanvoine, Louis Rilling, Christine Morin...
AINA
2011
IEEE
12 years 11 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
EDBTW
2006
Springer
13 years 9 months ago
Management of Executable Schema Mappings for XML Data Exchange
Abstract. Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The n...
Tadeusz Pankowski