Sciweavers

8770 search results - page 1499 / 1754
» Named Service Networking
Sort
View
JNW
2006
145views more  JNW 2006»
14 years 11 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
JSS
2006
58views more  JSS 2006»
14 years 11 months ago
A semantic-based P2P resource organization model R-Chord
This paper proposes a semantic-based P2P resource organization model R-Chord by incorporating the Resource Space Model (RSM), the P2P Semantic Link Network Model (P2PSLN) and the ...
Jie Liu, Hai Zhuge
IJSN
2007
82views more  IJSN 2007»
14 years 11 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
IJVR
2007
101views more  IJVR 2007»
14 years 11 months ago
Playful Geospatial Data Acquisition by Location-based Gaming Communities
—The success of Web 2.0 communities demonstrates that the users of an information service are willing to participate in the content creation process on a voluntary basis. In this...
Sebastian Matyas
IOR
2007
82views more  IOR 2007»
14 years 11 months ago
Compensating for Failures with Flexible Servers
We consider the problem of maximizing capacity in a queueing network with flexible servers, where the classes and servers are subject to failure. We assume that the interarrival ...
Sigrún Andradóttir, Hayriye Ayhan, D...
« Prev « First page 1499 / 1754 Last » Next »