Sciweavers

AINA
2004
IEEE
15 years 8 months ago
An Enhanced Gnutella P2P Protocol: A Search Perspective
Although Gnutella is the most popular Peer-to-Peer protocol for file sharing, drawbacks are often found in searching and locating files. They include that (1) a limited number of ...
Sai Ho Kwok, K. Y. Chan
AINA
2004
IEEE
15 years 8 months ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
AFRIGRAPH
2006
ACM
15 years 8 months ago
Affective scene generation
Carl Hultquist, James E. Gain, David E. Cairns
AINA
2004
IEEE
15 years 8 months ago
Topic-Centric Algorithm: A Novel Approach to Web Link Analysis
Link analysis has been used to enhance retrieval results of the web search for years. PageRank and HITS are the two well-known algorithms widely used by most researchers. The form...
Paricha Ingongngam, Arnon Rungsawang
AINA
2004
IEEE
15 years 8 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi