Sciweavers

1693 search results - page 251 / 339
» Interference-Resilient Information Exchange
Sort
View
IDTRUST
2009
ACM
15 years 11 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...
MOBIQUITOUS
2008
IEEE
15 years 10 months ago
Data aggregation in VANETs: the VESPA approach
VESPA (Vehicular Event Sharing with a mobile P2P Architecture) 1 is a system for enabling vehicles to share information in vehicular ad-hoc networks (VANETs). The originality of V...
Bruno Defude, Thierry Delot, Sergio Ilarri, Jos&ea...
GI
2007
Springer
15 years 10 months ago
Achieving Semantic Interoperability By Using Complex Event Processing Technology
: State-of-the-art interoperability between heterogeneous systems on a technical level builds on services oriented architectures (SOA) for a given problem space. Semantics can be i...
Margarete Donovang-Kuhlisch
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 10 months ago
A Reciprocation-Based Economy for Multiple Services in Peer-to-Peer Grids
Peer-to-peer grids aim to build computational grids encompassing thousands of sites. To achieve this scale, such systems cannot rely on trust or off-line negotiations among partic...
Miranda Mowbray, Francisco Vilar Brasileiro, Nazar...
WWW
2009
ACM
16 years 4 months ago
Rethinking email message and people search
We show how a number of novel email search features can be implemented without any kind of natural language processing (NLP) or advanced data mining. Our approach inspects the ema...
Sebastian Michel, Ingmar Weber