Sciweavers

2644 search results - page 118 / 529
» Emerging Technology
Sort
View
WETICE
2005
IEEE
15 years 9 months ago
A Reputation Management System in Structured Peer-to-Peer Networks
Since there is no method to verify the trustworthiness of shared files in P2P systems, malicious peers can spread untrustworthy files to the system. In order to prevent untrustw...
So Young Lee, O-Hoon Kwon, Jong Kim, Sung Je Hong
ISADS
2003
IEEE
15 years 9 months ago
The Central Guardian Approach to Enforce Fault Isolation in the Time-Triggered Architecture
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
Günther Bauer, Hermann Kopetz, Wilfried Stein...
ISADS
2003
IEEE
15 years 9 months ago
Patia: Adaptive Distributed Webserver
ct This paper introduces the Patia Adaptive Webserver architecture, which is distributed and consists of semi-autonomous agents called FLYs. The FLY carries with it the set of rule...
Julie A. McCann, Gawesh Jawaheer, Linxue Sun
WETICE
2003
IEEE
15 years 9 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
WETICE
2003
IEEE
15 years 9 months ago
On Optimal Update Policies and Cluster Sizes for 2-Tier Distributed Systems
We try to analyze a generic model for 2-tier distributed systems, exploring the possibility of optimal cluster sizes from an information management perspective, such that the over...
Prasenjit Dey, Anwitaman Datta