Sciweavers

1744 search results - page 155 / 349
» The Steganographic File System
Sort
View
ICDCSW
2007
IEEE
15 years 10 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
ICPADS
2006
IEEE
15 years 9 months ago
XYZ: A Scalable, Partially Centralized Lookup Service for Large-Scale Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the...
Jianying Zhang, Jie Wu
116
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
SEMWEB
2004
Springer
15 years 9 months ago
An Evaluation of Knowledge Base Systems for Large OWL Datasets
Abstract. In this paper, we present an evaluation of four knowledge base systems (KBS) with respect to use in large OWL applications. To our knowledge, no experiment has been done ...
Yuanbo Guo, Zhengxiang Pan, Jeff Heflin
CSREASAM
2006
15 years 5 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...