Sciweavers

194 search results - page 35 / 39
» A Protection Scheme for Collaborative Environments
Sort
View
74
Voted
P2P
2007
IEEE
15 years 3 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer
ICN
2005
Springer
15 years 3 months ago
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocol...
Tim Schattkowsky
IPSN
2005
Springer
15 years 3 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 2 months ago
Embedding Self-Management and Generic Learning Support into Courseware Structures
Traditional Computer-Aided Teaching and Learning (CAT/CAL) environments in multimedia-based teleeducation do not empower knowledge consumers (trainees, students etc.) to practice ...
Andreas Auinger, Christian Stary
JIDM
2010
155views more  JIDM 2010»
14 years 8 months ago
DeweyIDs - The Key to Fine-Grained Management of XML Documents
Because XML documents tend to be very large and are more and more collaboratively processed, their fine-grained storage and management is a must for which, in turn, a flexible tree...
Michael Peter Haustein, Theo Härder, Christia...