Sciweavers

4987 search results - page 55 / 998
» Fuzzifying P Systems
Sort
View
SIGOPSE
2004
ACM
15 years 8 months ago
Exploiting semantic clustering in the eDonkey P2P network
Sidath B. Handurukande, Anne-Marie Kermarrec, Fabr...
P2P
2008
IEEE
15 years 9 months ago
Designs and Evaluation of a Tracker in P2P Networks
The ”tracker” of a P2P system is used to lookup which peers hold (or partially hold) a given object. There are various designs for the tracker function, from a single-server t...
Adele Lu Jia, Dah-Ming Chiu
GPC
2009
Springer
15 years 7 months ago
G2G: A Meta-Grid Framework for the Convergence of P2P and Grids
Grid systems integrate distributed resources to form self-organization and self-management autonomies. Recently, for large-scale computation requirement, the collaboration of diffe...
Wu-Chun Chung, Chin-Jung Hsu, Yi-Shiang Lin, Kuan-...
GLOBECOM
2008
IEEE
15 years 9 months ago
Un-Leeching P2P Streaming by Active Overlay Management
We propose peer swapping as a means to improve the throughput of structured-overlay-based peer-to-peer (P2P) streaming systems. In many P2P streaming systems, an overlay is increm...
Jeonghun Noh, Pierpaolo Baccichet, Aditya Mavlanka...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 7 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko