Sciweavers

2200 search results - page 122 / 440
» Hop Integrity in Computer Networks
Sort
View
ICPADS
2008
IEEE
14 years 3 months ago
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to ...
Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ra...
HPCC
2007
Springer
14 years 3 months ago
A Generic Minimum Dominating Forward Node Set Based Service Discovery Protocol for MANETs
Abstract. Service discovery is a crucial feature for the usability of mobile ad-hoc networks (MANETs). In this paper, Minimum Dominating Forward Node Set based Service Discovery Pr...
Zhen-guo Gao, Sheng Liu, Mei Yang, Jinhua Zhao, Ji...
EDCC
2008
Springer
13 years 10 months ago
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems
We present the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an object (service or data)...
Vincent Gramoli, Anne-Marie Kermarrec, Erwan Le Me...
RECOMB
2003
Springer
14 years 9 months ago
An integrated probabilistic model for functional prediction of proteins
We develop an integrated probabilistic model to combine protein physical interactions, genetic interactions, highly correlated gene expression network, protein complex data, and d...
Minghua Deng, Ting Chen, Fengzhu Sun
ACMSE
2008
ACM
13 years 11 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins