Sciweavers

MMMACNS
2005
Springer
14 years 2 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
MMMACNS
2005
Springer
14 years 2 months ago
Foundation for a Time Interval Access Control Model
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
KIVS
2005
Springer
14 years 2 months ago
Reconfigurable consumer direct logistics systems
Abstract: The goals of the interdisciplinary project HORN were as well to improve competitiveness of service providers that deliver grocery items as to develop new hardware and sof...
Sébastien Truchat, Alexander Pflaum
KIVS
2005
Springer
14 years 2 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
KIVS
2005
Springer
14 years 2 months ago
Router Aided Congestion Avoidance with Scalable Performance Signaling
This paper justifies using explicit performance signaling in support of congestion control by means of a simple yet efficient scheme called “Congestion Avoidance with Distribute...
Michael Welzl
KIVS
2005
Springer
14 years 2 months ago
Peer-to-Peer-Systeme und -Anwendungen
Ralf Steinmetz, Klaus Wehrle, Oliver Heckmann
KIVS
2005
Springer
14 years 2 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...
KIVS
2005
Springer
14 years 2 months ago
A Comparison of WS-BusinessActivity and BPEL4WS Long-Running Transaction
Although WS-BusinessActivity and BPEL4WS Long-Running Transaction (LRT) are conceptually very similar and are both designed to support the execution of complex business transaction...
Patrick Sauter, Ingo Melzer
KIVS
2005
Springer
14 years 2 months ago
Dezentrale Steuerung verteilter Anwendungen mit rationalen Agenten
Abstract Herkömmliche Methoden für die Steuerung und Koordination verteilter Anwendungen mit weitgehend autonomen Diensten und Prozessen in heterogenen, sich dynamisch ändernden...
Alexander Pokahr, Lars Braubach, Winfried Lamersdo...
KIVS
2005
Springer
14 years 2 months ago
Exploiting Regular Hot-Spots for Drive-thru Internet
Abstract. IEEE 802.11 WLAN technology has become an inexpensive, yet powerful access technology that is targeted at mobile users that remain within reach of the hot-spot. Such hot-...
Jörg Ott, Dirk Kutscher