Sciweavers

1936 search results - page 343 / 388
» Network Analysis and Social Dynamics
Sort
View
CCR
2004
151views more  CCR 2004»
15 years 1 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
TKDE
2011
528views more  TKDE 2011»
14 years 9 months ago
The CoQUOS Approach to Continuous Queries in Unstructured Overlays
—The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism. The utility of these systems can be greatly en...
Lakshmish Ramaswamy, Jianxia Chen
WWW
2006
ACM
16 years 2 months ago
The SOWES approach to P2P web search using semantic overlays
Peer-to-peer (P2P) Web search has gained a lot of interest lately, due to the salient characteristics of P2P systems, namely scalability, fault-tolerance and load-balancing. Howev...
Christos Doulkeridis, Kjetil Nørvåg, ...
PODC
2009
ACM
16 years 2 months ago
Correctness of gossip-based membership under message loss
Due to their simplicity and effectiveness, gossip-based membership protocols have become the method of choice for maintaining partial membership in large P2P systems. A variety of...
Maxim Gurevich, Idit Keidar
AINA
2009
IEEE
15 years 8 months ago
Combined On-line and Off-line Trust Mechanism for Agent Computing
In this paper, we propose an efficient mechanism dealing with trust assessment for agent societies, aiming to accurately assess the trustworthiness of the collaborating agents. I...
Babak Khosravifar, Jamal Bentahar, Maziar Gomrokch...