—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
Abstract-- The next generation of computers will be embossed by ubiquitous systems. The computer will disappear behind daily artifacts and will support people in their everyday lif...
Faruk Bagci, Julian Wolf, Theo Ungerer, Nader Bagh...
Peer-to-Peer (P2P) technologies promise to provide efficient distribution, sharing and management of resources, such as storage, processing, routing and other sundry service capabi...
Networked virtual environments like Second Life enable distant people to meet for leisure as well as work. But users are represented through avatars controlled by keyboards and mo...
Benjamin Petit, Thomas Dupeux, Benoit Bossavit, Jo...
We present an approach to resource allocation in telecommunications networks based on the interaction of self-interested agents which have limited information about their environme...