Sciweavers

2702 search results - page 315 / 541
» Message from the Editor
Sort
View
AP2PC
2005
Springer
15 years 6 months ago
A Trust Management Scheme in Structured P2P Systems
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
CIE
2007
Springer
15 years 6 months ago
Finding Most Likely Solutions
Abstract. As one simple type of statistical inference problems we consider Most Likely Solution problem, a task of finding a most likely solution (MLS in short) for a given proble...
Osamu Watanabe, Mikael Onsjö
CONEXT
2007
ACM
15 years 6 months ago
Towards a clustering based data diffusion protocol in delay tolerant networks
In Delay Tolerant Networks (DTN), diffusion protocols can benefit from the users’ mobility in order to reach some distant nodes. However, existing protocols like flooding pres...
Sana Tmar, Eric Fleury
COORDINATION
2008
Springer
15 years 6 months ago
Multiparty Sessions in SOC
Abstract. Service oriented applications feature interactions among several participants over the network. Mechanisms such as correlation sets and two-party sessions have been propo...
Roberto Bruni, Ivan Lanese, Hernán C. Melgr...
CSREAEEE
2008
128views Business» more  CSREAEEE 2008»
15 years 5 months ago
Public relations System for Mobile Learning
- In this paper, we proposed an automatic pushing system, whereby the users of mobile devices set their preferences on the Internet and receive `pushed' contents, which are a ...
Chul-Woo Kim, Misook Lim, Young-Min Chin