Sciweavers

5948 search results - page 1032 / 1190
» Computing Robust Counter-Strategies
Sort
View
125
Voted
IPTPS
2004
Springer
15 years 9 months ago
P6P: A Peer-to-Peer Approach to Internet Infrastructure
Abstract— P6P is a new, incrementally deployable networking infrastructure that resolves the growing tensions between the Internet routing infrastructure and the end sites of the...
Lidong Zhou, Robbert van Renesse
136
Voted
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
15 years 9 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
176
Voted
ISW
2004
Springer
15 years 9 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
133
Voted
KR
2004
Springer
15 years 9 months ago
An Improved Integer Local Search for Complex Scheduling Problems
We consider complex scheduling problems that can be captured as optimization under hard and soft constraints. The objective of such an optimization problem is to satisfy as many h...
Weixiong Zhang, Xiaotao Zhang
139
Voted
MWCN
2004
Springer
15 years 9 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
« Prev « First page 1032 / 1190 Last » Next »