Sciweavers

1402 search results - page 130 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 3 months ago
SurePath: An Approach to Resilient Anonymous Routing
Current anonymous systems either use a small, fixed core set of mixes or randomly choose a sequence of peer nodes to form anonymous paths/tunnels. The resulting paths are fragile ...
Yingwu Zhu, Yiming Hu
168
Voted
BTW
2005
Springer
142views Database» more  BTW 2005»
15 years 9 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
153
Voted
PVLDB
2010
114views more  PVLDB 2010»
15 years 2 months ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...
DEXAW
2005
IEEE
123views Database» more  DEXAW 2005»
15 years 9 months ago
Requirements for the Visualization of System-Spanning Business Processes
The monitoring and visualization of enterprise-wide and cross-organizational business processes is an important, but also very complex task. The information needed for visualizing...
Ralph Bobrik, Manfred Reichert, Thomas Bauer
104
Voted
ICPADS
2008
IEEE
15 years 10 months ago
Integrating Sensor Streams in pHealth Networks
Personal Health (pHealth) sensor networks are generally used to monitor the wellbeing of both athletes and the general public to inform health specialists of future and often seri...
Mark Roantree, Dónall McCann, Niall Moyna