Sciweavers

841 search results - page 36 / 169
» Accounting Mechanisms for Distributed Work Systems
Sort
View
IMC
2006
ACM
15 years 3 months ago
A study of malware in peer-to-peer networks
Peer-to-peer (P2P) networks continue to be popular means of trading content. However, very little protection is in place to make sure that the files exchanged in these networks a...
Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta
TSE
1998
96views more  TSE 1998»
14 years 9 months ago
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
—Design and evaluation of groupware systems raise questions which do not have to be addressed in the context of single user systems. The designer has to take into account not onl...
Oliver Stiemerling, Armin B. Cremers
ISAS
2005
Springer
15 years 3 months ago
Dependable Distributed Computing Using Free Databases
Abstract. Designing and programming dependable distributed applications is very difficult. Databases provide features like transactions and replication that can help in the impleme...
Christof Fetzer, Trevor Jim
HPCA
2008
IEEE
15 years 10 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
IPTPS
2003
Springer
15 years 3 months ago
Rationality and Self-Interest in Peer to Peer Networks
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify ...
Jeffrey Shneidman, David C. Parkes