Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
Abstract. Searching for information on the Internet became much easier when Google started delivering their service. We got used to getting the most important (probably) results on...
The paper develops a novel computational framework for predicting communication flow in social networks based on several contextual features. The problem is important because pred...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
Current service discovery and subscription are “provider-centric” indeed, which costs the consumers too many efforts and makes the wide spectrum of QoS hard to use. In this po...
While the Internet community recognized early on the need to store and preserve past content of the Web for future use, the tools developed so far for retrieving information from ...
Adam Jatowt, Yukiko Kawai, Satoshi Nakamura, Yutak...