Sciweavers

NTMS
2009
IEEE
14 years 6 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
WETICE
2009
IEEE
14 years 6 months ago
PerfCloud: GRID Services for Performance-Oriented Development of Cloud Computing Applications
—Cloud Computing, born in the e-business context, and GRID computing, originated in the e-science context, are two different but similar paradigms for managing large sets of dist...
Emilio Pasquale Mancini, Massimiliano Rak, Umberto...
WETICE
2009
IEEE
14 years 6 months ago
Performance Evaluation of Grid-Enabled Code: A Case Study
—This paper presents the performance analysis of a grid-enabled MIP solver in a grid environment consisting of three clusters on a campus LAN. In particular, the paper focuses on...
Sonya Marcarelli, Emilio Pasquale Mancini, Umberto...
WETICE
2009
IEEE
14 years 6 months ago
UniWiki: A Collaborative P2P System for Distributed Wiki Applications
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. Wh...
Gérald Oster, Pascal Molli, Sergiu Dumitriu...
WETICE
2009
IEEE
14 years 6 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
WETICE
2009
IEEE
14 years 6 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
WETICE
2009
IEEE
14 years 6 months ago
GeoIGM: A Location-Aware IGM Platform
—In recent years, peer-to-peer systems have gained traction in a number of important areas including; file-sharing, VoIP and scientific research vehicles such as the Grid. We a...
Neil Cowzer, Aaron J. Quigley
WETICE
2009
IEEE
14 years 6 months ago
A Game Theoretical Approach in Securing P2P Storage against Whitewashers
—An inherent problem to a cooperation incentive mechanism implemented into a dynamic system where peers may join or leave at any time is the whitewashing problem. Whitewashers ar...
Nouha Oualha, Yves Roudier
WETICE
2009
IEEE
14 years 6 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
WETICE
2009
IEEE
14 years 6 months ago
What Networking of Information Can Do for Cloud Computing
Börje Ohlman, Anders Eriksson, René Re...