Sciweavers

8493 search results - page 1325 / 1699
» Implementing a distributed firewall
Sort
View
SIGIR
2004
ACM
15 years 10 months ago
Bookmark-driven Query Routing in Peer-to-Peer Web Search
: We consider the problem of collaborative Web search and query routing strategies in a peer-to-peer (P2P) environment. In our architecture every peer has a full-fledged search en...
Matthias Bender, Sebastian Michel, Gerhard Weikum,...
WMASH
2004
ACM
15 years 10 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
CAAN
2004
Springer
15 years 10 months ago
Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives
We study the bandwidth allocation problem Maximize U(x), subject to Ax ≤ c; x ≥ 0 where U is a utility function, x is a bandwidth allocation vector, and Ax ≤ c represent the...
Sung-woo Cho, Ashish Goel
136
Voted
CAISE
2004
Springer
15 years 10 months ago
Enabling Personalized Composition and Adaptive Provisioning of Web Services
Abstract. The proliferation of interconnected computing devices is fostering the emergence of environments where Web services made available to mobile users are a commodity. Unfort...
Quan Z. Sheng, Boualem Benatallah, Zakaria Maamar,...
144
Voted
CCS
2004
ACM
15 years 10 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
« Prev « First page 1325 / 1699 Last » Next »