Sciweavers

3638 search results - page 659 / 728
» Distribution chain security
Sort
View
105
Voted
ICIP
2008
IEEE
15 years 10 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
116
Voted
IEEESCC
2008
IEEE
15 years 10 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
144
Voted
LCN
2008
IEEE
15 years 10 months ago
Spatially Disjoint Multipath Routing protocol without location information
—Multipath routing permits the discovery and use of multiple paths between a source and a destination. We develop a distributed on-demand multipath routing protocol for MANETs ca...
Juan Jose Galvez, Pedro M. Ruiz, Antonio F. G&oacu...
129
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
136
Voted
DSN
2007
IEEE
15 years 10 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble