Sciweavers

2335 search results - page 368 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
TIFS
2010
186views more  TIFS 2010»
15 years 3 days ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
15 years 6 months ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...
LCN
1998
IEEE
15 years 6 months ago
QoS Routing in Ad Hoc Wireless Networks
Abstract-- The emergence of nomadic applications have recently generated much interest in wireless network infrastructures that support real-time communications. In this paper, we ...
C. R. Lin
106
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
RCC
2000
113views more  RCC 2000»
15 years 1 months ago
The Aristotle Approach to Open Hypermedia
Large-scale distributed hypermedia systems comprise a generation of powerful tools to meet the demands of the new information globalization era. The most promising of such systems...
Costas Petrou, Drakoulis Martakos, Michael Hatzopo...