Sciweavers

ICDCSW
2005
IEEE
14 years 5 months ago
An Intermediary Software Infrastructure for Edge Services
We describe the goals and architecture of a new framework that aims at facilitating the deployment of adaptation services running on intermediate edge servers. The main goal is to...
Raffaella Grieco, Delfina Malandrino, Vittorio Sca...
ICDCSW
2005
IEEE
14 years 5 months ago
A Distributed Alerting Service for Open Digital Library Software
Alerting for Digital Libraries (DL) is an important and useful feature for the library users. To date, two independent services and a few publisher-hosted proprietary services hav...
Annika Hinze, George Buchanan
ICDCSW
2005
IEEE
14 years 5 months ago
Cluster-Based Intelligent Searching in Unstructured Peer-to-Peer Networks
Existing cluster-based searching schemes in unstructured peer-to-peer (P2P) networks employ flooding/random forwarding on connected dominating sets (CDS) of networks. There exist...
Xiuqi Li, Jie Wu
ICDCSW
2005
IEEE
14 years 5 months ago
On Introducing Location Awareness in Publish-Subscribe Middleware
Having the possibility of routing messages only toward specific areas or subscribing to messages originating in specific locations seems natural when a publish-subscribe model o...
Gianpaolo Cugola, Jose Enrique Munoz de Cote
ICDCSW
2005
IEEE
14 years 5 months ago
A Distributed Architecture for Management and Retrieval of Extended Points of Interest
This paper presents a distributed architecture for the management and retrieval of particular objects called POIsmarts. POIsmarts can be considered as the convergence between virt...
Claudio Bettini, Nicolò Cesa-Bianchi, Danie...
ICDCSW
2005
IEEE
14 years 5 months ago
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast
Theorists and practitioners have fairly different perspectives on how wireless broadcast works. Theorists think about synchrony; practitioners think about backoff. Theorists assum...
Gregory Chockler, Murat Demirbas, Seth Gilbert, Na...
ICDCSW
2005
IEEE
14 years 5 months ago
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming
The widespread popularity of roaming wireless devices with limited and heterogeneous capabilities is enabling new challenging deployment scenarios for multimedia streaming in wire...
Paolo Bellavista, Antonio Corradi, Carlo Giannelli
ICDCSW
2005
IEEE
14 years 5 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ICDCSW
2005
IEEE
14 years 5 months ago
IASO - An Activity-Based Computing Platform for Wearable Computing
Displaying and navigating complex information on wearable computers is very different from accessing the same information while sitting at your desk. Limitations in hardware, scre...
Jakob E. Bardram, Jonathan Bunde-Pedersen
ICDCSW
2005
IEEE
14 years 5 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang