Sciweavers

1833 search results - page 138 / 367
» Mechanized Verification with Sharing
Sort
View
IOR
2008
82views more  IOR 2008»
15 years 4 months ago
Heavy-Traffic Optimality of a Stochastic Network Under Utility-Maximizing Resource Allocation
We study a stochastic network that consists of a set of servers processing multiple classes of jobs. Each class of jobs requires a concurrent occupancy of several servers while be...
Heng-Qing Ye, David D. Yao
SIGMETRICS
2004
ACM
118views Hardware» more  SIGMETRICS 2004»
15 years 10 months ago
A game theoretic approach to provide incentive and service differentiation in P2P networks
Traditional Peer-to-Peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can easily access information without contributing any ...
Richard T. B. Ma, Sam C. M. Lee, John C. S. Lui, D...
AINA
2004
IEEE
15 years 8 months ago
An Enhanced Gnutella P2P Protocol: A Search Perspective
Although Gnutella is the most popular Peer-to-Peer protocol for file sharing, drawbacks are often found in searching and locating files. They include that (1) a limited number of ...
Sai Ho Kwok, K. Y. Chan
EXPERT
2008
77views more  EXPERT 2008»
15 years 4 months ago
Is a Semantic Web Agent a Knowledge-Savvy Agent?
nition of a common model that abstracted the shared knowledge (ontology); a formalism for representing such knowledge (Knowledge Interchange Format, or KIF); and a transport-indepe...
Valentina A. M. Tamma, Terry R. Payne
CCS
2008
ACM
15 years 6 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin