Sciweavers

2747 search results - page 334 / 550
» Network externalities in software systems
Sort
View
IMC
2004
ACM
14 years 3 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
CLUSTER
2004
IEEE
13 years 10 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
IJWIS
2007
153views more  IJWIS 2007»
13 years 10 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
MSWIM
2006
ACM
14 years 4 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
EUROSYS
2006
ACM
14 years 7 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...