Sciweavers

2287 search results - page 80 / 458
» Peer data exchange
Sort
View
ACMSE
2009
ACM
13 years 6 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
WIDM
2004
ACM
14 years 2 months ago
Querying structured data in an unstructured P2P system
Abstract— Peer-to-Peer networking has become a major research topic over the last few years. Sharing of structured data in such decentralized environments is a challenging proble...
Verena Kantere, Dimitrios Tsoumakos, Nick Roussopo...
BMCBI
2007
104views more  BMCBI 2007»
13 years 9 months ago
Validating module network learning algorithms using simulated data
Tom Michoel, Steven Maere, Eric Bonnet, Anagha Jos...
EDBTW
2004
Springer
14 years 2 months ago
Semantic Query Routing and Processing in P2P Database Systems: The ICS-FORTH SQPeer Middleware
Abstract. Peer-to-peer (P2P) computing is currently attracting enormous attention. In P2P systems a very large number of autonomous computing nodes (the peers) pool together their ...
Giorgos Kokkinidis, Vassilis Christophides
ICCS
2009
Springer
13 years 6 months ago
Graphical Notation for Diagramming Coupled Systems
Multiphysics and multiscale
J. Walter Larson