Sciweavers

2287 search results - page 80 / 458
» Peer data exchange
Sort
View
ACMSE
2009
ACM
15 years 24 days ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
WIDM
2004
ACM
15 years 8 months ago
Querying structured data in an unstructured P2P system
Abstract— Peer-to-Peer networking has become a major research topic over the last few years. Sharing of structured data in such decentralized environments is a challenging proble...
Verena Kantere, Dimitrios Tsoumakos, Nick Roussopo...
BMCBI
2007
104views more  BMCBI 2007»
15 years 3 months ago
Validating module network learning algorithms using simulated data
Tom Michoel, Steven Maere, Eric Bonnet, Anagha Jos...
EDBTW
2004
Springer
15 years 8 months ago
Semantic Query Routing and Processing in P2P Database Systems: The ICS-FORTH SQPeer Middleware
Abstract. Peer-to-peer (P2P) computing is currently attracting enormous attention. In P2P systems a very large number of autonomous computing nodes (the peers) pool together their ...
Giorgos Kokkinidis, Vassilis Christophides
ICCS
2009
Springer
15 years 22 days ago
Graphical Notation for Diagramming Coupled Systems
Multiphysics and multiscale
J. Walter Larson