— The execution of data intensive grid applications still raises several questions regarding job scheduling, data migration and replication. The optimization techniques applied b...
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
CAFE (Collaborative Agents for Filtering E-mails) is a multi-agent system to collaboratively filter spam from users’ mail stream. CAFE associates a proxy agent with each user, a...
: This paper describes the key ideas in the new Grid model: MiG (Minimum intrusion Grid). “The Simple Model” is a major milestone in developing the full MiG concept and when co...
The demand for flexible, efficient and user-friendly collaborative services is becoming more and more urgent as the competition in the current marketoriented arena is getting more...
In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...