This paper suggests a method called Trust-but-Verify that may turn DHT-based peer-to-peer systems into systems that are provably robust against even massive adversarial attacks.
Enterprise systems are frequently built by combining a number of discrete Web services together, a process termed composition. There are a number of architectural configurations ...
Heterogeneous networks of computers have rapidly become a very promising commodity computing solution, expected to play a major role in the design of high performance computing sy...
The challenge of peer-to-peer computing goes beyond simple file sharing. In the DBGlobe project, we view the multitude of peers carrying data and services as a superdatabase. Our ...
Event-based middleware is currently being applied for application component integration in a range of application domains. As a result, a variety of event services have been propo...