Sciweavers

2214 search results - page 263 / 443
» Dynamic Protocol Recovery
Sort
View
126
Voted
PODC
2003
ACM
15 years 8 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
93
Voted
ICCS
2003
Springer
15 years 8 months ago
Computational Science Simulations Based on Web Services
Abstract. We describe the software architecture of a system for doing multiphysics simulation of a coupled fluid, thermal, and mechanical fracture problem. The system is organized...
L. Paul Chew, Nikos Chrisochoides, S. Gopalsamy, G...
SPW
2001
Springer
15 years 8 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
122
Voted
WETICE
1998
IEEE
15 years 7 months ago
An Open Architecture for Supporting Collaboration on the Web
The MEMOIR framework supports researchers working with a vast quantity of distributed information, by assisting them in finding both relevant documents and researchers with relate...
David De Roure, Wendy Hall, Siegfried Reich, Aggel...
AINA
2004
IEEE
15 years 7 months ago
A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks
IP multicasting has naturally been considered the ideal technique to be used with multimedia communications. Unfortunately, current multicast protocols do not consider the dynamic...
Wu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh S...