Sciweavers

1063 search results - page 115 / 213
» Infrastructure Leasing Problems
Sort
View
CAISE
2003
Springer
14 years 3 months ago
OMNIX: A Topology-Independent P2P Middleware
Peer-to-Peer (P2P) computing has been increasingly gaining interest. P2P architectures are no longer just used for sharing music files over the InP2P middleware systems attempt to...
Roman Kurmanowytsch, Engin Kirda, Clemens Kerer, S...
IPTPS
2003
Springer
14 years 3 months ago
Rationality and Self-Interest in Peer to Peer Networks
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify ...
Jeffrey Shneidman, David C. Parkes
NDSS
2002
IEEE
14 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
14 years 2 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
EDBT
2009
ACM
112views Database» more  EDBT 2009»
14 years 2 months ago
GCIP: exploiting the generation and optimization of integration processes
As a result of the changing scope of data management towards the management of highly distributed systems and applications, integration processes have gained in imporuch integrati...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...