Sciweavers

3047 search results - page 385 / 610
» A Secure Distributed Search System
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 11 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
AGENTS
2000
Springer
15 years 9 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
JNW
2006
120views more  JNW 2006»
15 years 5 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
15 years 10 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
ECTEL
2006
Springer
15 years 8 months ago
Interoperability for Peer-to-Peer Networks: Opening P2P to the Rest of the World
Due to the information growth, distributed environments are offered as a feasible and scalable solution where Peerto-Peer networks have become more relevant. They bring many advan...
Ingo Brunkhorst, Daniel Olmedilla