Sciweavers

240 search results - page 40 / 48
» Improving cooperation in peer-to-peer systems using social n...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
GROUP
2007
ACM
13 years 10 months ago
From plans to planning: the case of nursing plans
Drawing on a critical perspective stemming from socially informed studies of medicine, we analyze an ongoing effort to establish electronic nursing plans at the university hospita...
Glenn Munkvold, Gunnar Ellingsen, Eric Monteiro
INFOCOM
2007
IEEE
14 years 3 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
SIGECOM
2005
ACM
98views ECommerce» more  SIGECOM 2005»
14 years 2 months ago
Hidden-action in multi-hop routing
In multi-hop networks, the actions taken by individual intermediate nodes are typically hidden from the communicating endpoints; all the endpoints can observe is whether or not th...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
CCS
2006
ACM
14 years 14 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...