Sciweavers

7213 search results - page 164 / 1443
» Automated model grouping
Sort
View
EDBT
2004
ACM
129views Database» more  EDBT 2004»
16 years 4 months ago
Beyond 1-Safety and 2-Safety for Replicated Databases: Group-Safety
In this paper, we study the safety guarantees of group communication-based database replication techniques. We show that there is a model mismatch between group communication and ...
Matthias Wiesmann, André Schiper
ADVIS
2004
Springer
15 years 9 months ago
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme
Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...
150
Voted
COCOON
2010
Springer
15 years 8 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
APAL
2006
79views more  APAL 2006»
15 years 3 months ago
Cardinal invariants related to permutation groups
We consider the possible cardinalities of the following three cardinal invariants which are related to the permutation group on the set of natural numbers: ag := the least cardina...
Bart Kastermans, Yi Zhang 0008
CSCW
2012
ACM
13 years 11 months ago
To stay or leave?: the relationship of emotional and informational support to commitment in online health support groups
Today many people with serious diseases use online support groups to seek social support. For these groups to be sustained and effective, member retention and commitment is import...
Yi-Chia Wang, Robert Kraut, John M. Levine