We compare two possible mechanisms to manage a peer-to-peer storage system, where participants can store data online on the disks of peers in order to increase data availability an...
This paper presents two algorithms for maintaining Btree index consistency in a DBMS which does not use write-ahead logging (WAL). One algorithm is similar to shadow paging, but i...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
The majority of financial services companies in Germany and Switzerland have, with varying objectives and success, conducted customer relationship management (CRM) implementation ...
Malte Geib, Annette Reichold, Lutz Kolbe, Walter B...
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...