Sciweavers

163 search results - page 8 / 33
» Framework for Decentralizing Legacy Applications
Sort
View
77
Voted
WETICE
2008
IEEE
15 years 3 months ago
Decentralized Network Analysis: A Proposal
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, w...
Alberto Montresor
P2P
2002
IEEE
147views Communications» more  P2P 2002»
15 years 2 months ago
Building a P2P Forum System with JXTA
Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
Emir Halepovic, Ralph Deters
96
Voted
ISCC
2006
IEEE
154views Communications» more  ISCC 2006»
15 years 3 months ago
Decentralized Load Balancing for Highly Irregular Search Problems
In this paper, we present a Dynamic Load Balancing (DLB) policy for problems characterized by a highly irregular search tree, whereby no reliable workload prediction is available....
Giuseppe Di Fatta, Michael R. Berthold
ECIS
2004
14 years 11 months ago
Patterns in Application Development Sourcing in the Financial Industry
Sourcing, or the question of what a company should carry out in-house and what should be acquired elsewhere, has been discussed for quite some time. This paper addresses the sourc...
Anders Mårtensson
CCS
2007
ACM
15 years 3 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...