Sciweavers

10633 search results - page 1688 / 2127
» Relating Distributed Objects
Sort
View
138
Voted
ISPA
2004
Springer
15 years 9 months ago
A Congestion-Aware Search Protocol for Unstructured Peer-to-Peer Networks
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the sca...
Kin Wah Kwong, Danny H. K. Tsang
167
Voted
WEBI
2004
Springer
15 years 9 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
128
Voted
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 9 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
DSN
2003
IEEE
15 years 9 months ago
From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and Benefits
Many fault-tolerant group communication middleware systems have been implemented assuming crash failure semantics. While this assumption is not unreasonable, it becomes hard to ju...
Dimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Spe...
108
Voted
DSN
2003
IEEE
15 years 9 months ago
Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study
Systems that are formed by massively distributed mobile resources, such as satellite constellations, often provide mission-critical functions. However, many existing quality-of-se...
Ann T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Cha...
« Prev « First page 1688 / 2127 Last » Next »