Sciweavers

1128 search results - page 162 / 226
» A Case for Buffer Servers
Sort
View
PDP
2009
IEEE
15 years 6 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
DSN
2009
IEEE
15 years 6 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
103
Voted
ICAC
2009
IEEE
15 years 6 months ago
Applying adaptation design patterns
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...
Andres J. Ramirez, Betty H. C. Cheng
CIMCA
2008
IEEE
15 years 6 months ago
Adaption of Courses and Learning Environment to the User Context in dotLRN
The explosive growth of Internet during the last years has been reflected in the ever-increasing amount of the diversity and heterogeneity of user preferences, types and features ...
David Huerva, Jeimy Velez, Silvia Baldiris, Ram&oa...
ICSM
2008
IEEE
15 years 6 months ago
Standard-based data and service interoperability in eHealth systems
International standardization in information representation, organization, and dissemination are meant to eliminate the discrepancies in communication among participating organiza...
Kamran Sartipi, Mohammad H. Yarmand