Sciweavers

1102 search results - page 199 / 221
» Distributed Key Generation for the Internet
Sort
View
93
Voted
ICDCSW
2005
IEEE
15 years 7 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
15 years 7 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
CD
2004
Springer
15 years 7 months ago
Dynamic Deployment of Executing and Simulating Software Components
Physical boundaries have caused software systems to become less monolithic and more distributed. The trend is progressing to a point where software systems will consist of numerous...
Alexander Egyed
ICDCSW
2003
IEEE
15 years 7 months ago
Autonomous Cooperation Technologies for Achieving Real Time Property and Fault Tolerance in Service Oriented Community System
The advancement of wireless communication and mobile telecommunication has made mobile commerce possible. In the retail business under the evolving market, the users would like to...
Naohiro Kaji, Khaled Ragab, Takanori Ono, Kinji Mo...
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
15 years 7 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam