Sciweavers

5970 search results - page 975 / 1194
» Management Information Model Engineering
Sort
View
ISW
2009
Springer
15 years 11 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
CIKM
2009
Springer
15 years 11 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
147
Voted
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 10 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
KDD
2004
ACM
116views Data Mining» more  KDD 2004»
15 years 10 months ago
A system for automated mapping of bill-of-materials part numbers
Part numbers are widely used within an enterprise throughout the manufacturing process. The point of entry of such part numbers into this process is normally via a Bill of Materia...
Jayant Kalagnanam, Moninder Singh, Sudhir Verma, M...
SIGUCCS
2003
ACM
15 years 9 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah