Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ISPA
2005
Springer
10 years 9 months ago
The Application of Collaborative Filtering for Trust Management in P2P Communities
The open and anonymous nature of P2P services opens the door to malicious peers who cause the loss of trust by providing corrupted data or
Min Zuo, Kai Wang, Jianhua Li
ISPA
2005
Springer
10 years 9 months ago
FleMA: A Flexible Measurement Architecture for ChinaGrid
Grid technologies are becoming more and more mature in recent years. In contrast to this trend, the resource measurement landscape in Grids looks rather dismal. As part of ChinaGri...
Weimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing...
ISPA
2005
Springer
10 years 9 months ago
Near Optimal Routing in a Small-World Network with Augmented Local Awareness
In order to investigate the routing aspects of small-world networks, Kleinberg [13] proposes a network model based on a d-dimensional lattice with long-range links chosen at random...
Jianyang Zeng, Wen-Jing Hsu, Jiangdian Wang
ISPA
2005
Springer
10 years 9 months ago
A Knowledge-Driven Method to Evaluate Multi-source Clustering
Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasim...
ISPA
2005
Springer
10 years 9 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
ISPA
2005
Springer
10 years 9 months ago
Introduction to ChinaGrid Support Platform
Yongwei Wu, Song Wu, Huashan Yu, Chunming Hu
ISPA
2005
Springer
10 years 9 months ago
Redundancy Schemes for High Availability in DHTs
High availability in peer-to-peer DHTs requires data redundancy. This paper takes user download behavior into account to evaluate redundancy schemes in data storage and share syste...
Fan Wu, Tongqing Qiu, YueQuan Chen, Guihai Chen
ISPA
2005
Springer
10 years 9 months ago
Storage-Optimal Key Sharing with Authentication in Sensor Networks
Abstract. Wireless Sensor Networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit thei...
Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
ISPA
2005
Springer
10 years 9 months ago
Research and Implementation of Workflow Interoperability Crossing Organizations
In order to resolve the shortcomings of traditional workflow interoperation and realize more flexible workflow interoperation, this article describes a new workflow interoperating ...
Dingsheng Wan, Qing Li, Guihai Chen
books