Sciweavers

163 search results - page 19 / 33
» Testing Peers' Volatility
Sort
View
PAM
2007
Springer
14 years 4 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
WETICE
2006
IEEE
14 years 3 months ago
A Hybrid P2P Protocol for Real-Time Collaboration
Peer-to-Peer architecture is currently an attractive solution for facilitating the use of collaboration software without any server. Multicasting is usually proposed for group com...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
ENTCS
2006
112views more  ENTCS 2006»
13 years 9 months ago
Modeling Web Applications by the Multiple Levels of Integrity Policy
We propose a formal method to validate the reliability of a web application, by modeling interactions among its constituent objects. Modeling exploits the recent "Multiple Le...
Gianluca Amato, Massimo Coppola, Stefania Gnesi, F...
IJIIDS
2008
100views more  IJIIDS 2008»
13 years 9 months ago
A novel vehicle communication paradigm based on Cellular Networks for improving the safety in roads
: Main aim of Intelligent Transport Systems (ITS) applied to roads is to increase their safety. To achieve this aim, many researchers are focused on developing robust and efficient...
José Santa, Rafael Toledo-Moreo, Antonio F....
PVLDB
2008
112views more  PVLDB 2008»
13 years 9 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...