Sciweavers

1016 search results - page 190 / 204
» Peering Peer-to-Peer Providers
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
HPCA
1998
IEEE
14 years 21 days ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill
NSDI
2007
13 years 10 months ago
A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...
Yihua He, Georgos Siganos, Michalis Faloutsos, Sri...
BXML
2004
13 years 9 months ago
Ontology-derived Activity Components for Composing Travel Web Services
: In this paper we present our ongoing work in creating a semantic Web service composition and execution framework. The efforts described are undertaken in the context of the SATIN...
Matthias Flügge, Diana Tourtchaninova
CONEXT
2009
ACM
13 years 9 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau