Sciweavers

OTM
2007
Springer
14 years 1 months ago
Improving the Dependability of Prefix-Based Routing in DHTs
Sabina Serbu, Peter Kropf, Pascal Felber
OTM
2007
Springer
14 years 1 months ago
Implementing a State-Based Application Using Web Objects in XML
In this paper we introduce Web Objects in XML (WOX) as a web protocol for distributed objects, which uses HTTP as its transport protocol and XML as its format representation. It al...
Carlos R. Jaimez González, Simon M. Lucas
OTM
2007
Springer
14 years 1 months ago
Experience with Dynamic Crosscutting in Cougaar
Component-based middleware frameworks that support distributed agent societies have proven to be very useful in a variety of domains. Such frameworks must include support for both ...
John A. Zinky, Richard Shapiro, Sarah Siracuse, To...
OTM
2007
Springer
14 years 1 months ago
Semantic Matching Based on Enterprise Ontologies
Semantic Web technologies have in recent years started to also find their way into the world of commercial enterprises. Enterprise ontologies can be used as a basis for determinin...
Andreas Billig, Eva Blomqvist, Feiyu Lin
OTM
2007
Springer
14 years 1 months ago
Data-Driven Modeling and Coordination of Large Process Structures
Abstract. In the engineering domain, the development of complex products (e.g., cars) necessitates the coordination of thousands of (sub-)processes. One of the biggest challenges f...
Dominic Müller, Manfred Reichert, Joachim Her...
ICDCIT
2007
Springer
14 years 1 months ago
Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks
This paper considers the problem of unicasting in wireless ad hoc networks. Unicasting is the problem of finding a route between a source and a destination and forwarding the mess...
Rohit Ashok Khot, Ravikant Poola, Kishore Kothapal...
ICDCIT
2007
Springer
14 years 1 months ago
An Analytical Estimation of Durability in DHTs
Fabio Picconi, Bruno Baynat, Pierre Sens
CEAS
2007
Springer
14 years 1 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...
CEAS
2007
Springer
14 years 1 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
CEAS
2007
Springer
14 years 1 months ago
A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification
We propose a discriminative classifier learning approach to image modeling for spam image identification. We analyze a large number of images extracted from the SpamArchive spam c...
Byungki Byun, Chin-Hui Lee, Steve Webb, Calton Pu