Sciweavers

4897 search results - page 83 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
ICCSA
2003
Springer
14 years 2 months ago
An Example of an Automatic Differentiation-Based Modelling System
Thomas Kaminski, Ralf Giering, Marko Scholze, Pete...
DBISP2P
2003
Springer
136views Database» more  DBISP2P 2003»
14 years 2 months ago
Building Content-Based Publish/Subscribe Systems with Distributed Hash Tables
Abstract. Building distributed content–based publish/subscribe systems has remained a challenge. Existing solutions typically use a relatively small set of trusted computers as b...
David K. Tam, Reza Azimi, Hans-Arno Jacobsen
IWANN
2009
Springer
14 years 1 months ago
A Soft Computing System to Perform Face Milling Operations
In this paper we present a soft computing system developed to optimize the face milling operation under High Speed conditions in the manufacture of steel components like molds with...
Raquel Redondo, Pedro Santos, Andrés Bustil...
CISIS
2009
IEEE
14 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...