Sciweavers

859 search results - page 96 / 172
» The Changing Face of Cryptography
Sort
View
BPM
2007
Springer
120views Business» more  BPM 2007»
14 years 4 months ago
Autonomic Business Processes Scalable Architecture
Organizations have to face new challenges, hold new opportunities, conquer and maintain important customers and get a better strategic position as faster as possible. The principle...
José A. Rodrigues Nt., Pedro C. L. Monteiro...
ECTEL
2007
Springer
14 years 4 months ago
Learning from the Past: TEL Implementation 1997 and 2007
This paper argues that the key challenges facing HE institutions in 2007 are the same as a decade previously and therefore that lessons may be learned from previous attempts to emp...
Stephen Brown
TELETRAFFIC
2007
Springer
14 years 4 months ago
Estimating Churn in Structured P2P Networks
In structured peer-to-peer (P2P) networks participating peers can join or leave the system at arbitrary times, a process which is known as churn. Many recent studies revealed that ...
Andreas Binzenhöfer, Kenji Leibnitz
IEEEARES
2006
IEEE
14 years 4 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
CODES
2005
IEEE
14 years 3 months ago
Energy conscious online architecture adaptation for varying latency constraints in sensor network applications
Sensor network applications face continuously changing environments, which impose varying processing loads on the sensor node. This paper presents an online control method which a...
Sankalp Kallakuri, Alex Doboli