Sciweavers

4897 search results - page 875 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
SI3D
1997
ACM
15 years 8 months ago
Two-Handed Direct Manipulation on the Responsive Workbench
We have built a system that allows users to naturally manipulate virtual 3D models with both hands on the Responsive Workbench, a tabletop VR device. Our design is largely based u...
Lawrence D. Cutler, Bernd Fröhlich, Pat Hanra...
IPPS
2008
IEEE
15 years 11 months ago
Random choices for churn resilient load balancing in peer-to-peer networks
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objecti...
Song Fu, Cheng-Zhong Xu, Haiying Shen
IWNAS
2008
IEEE
15 years 11 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
ICAC
2006
IEEE
15 years 10 months ago
Autonomic Provisioning of Backend Databases in Dynamic Content Web Servers
— In autonomic provisioning, a resource manager allocates resources to an application, on-demand, e.g., during load spikes. Modelling-based approaches have proved very successful...
Jin Chen, Gokul Soundararajan, Cristiana Amza
ICEGOV
2007
ACM
15 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...