Sciweavers

7865 search results - page 1461 / 1573
» Peer-to-Peer Data Management
Sort
View
NOMS
2008
IEEE
139views Communications» more  NOMS 2008»
15 years 4 months ago
Fast similarity search in peer-to-peer networks
Abstract—Peer-to-peer (P2P) systems show numerous advantages over centralized systems, such as load balancing, scalability, and fault tolerance, and they require certain function...
Thomas Bocek, Ela Hunt, David Hausheer, Burkhard S...
APSEC
2007
IEEE
15 years 4 months ago
A Six Sigma Framework for Software Process Improvements and its Implementation
Six Sigma has been adopted by many software development organizations to identify problems in software projects and processes, find optimal solutions for the identified problems, ...
Zhedan Pan, Hyuncheol Park, Jongmoon Baik, Ho-Jin ...
LANOMS
2007
IEEE
172views Education» more  LANOMS 2007»
15 years 4 months ago
Implementing and Deploying Network Monitoring Service Oriented Architectures
—Recently there is a growing interest in accessing network measurement and status data across multiple domains, in order to detect eventual network problems which can hinder the ...
Leobino Nascimento Sampaio, Ivo Koga, Rafael Costa...
PDP
2007
IEEE
15 years 4 months ago
Metadata Integration and Media Transcoding in Universal-Plug-and-Play (UPnP) Enabled Networks
Universal Plug and Play (UPnP) is a widely accepted standard for automatically detecting devices and services in a local area network as well as for describing and controlling the...
M. Jakab, Michael Kropfberger, M. Ofner, Roland Tu...
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 4 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
« Prev « First page 1461 / 1573 Last » Next »