Sciweavers

1575 search results - page 243 / 315
» Simultaneous Source Location
Sort
View
146
Voted
ETRICS
2006
15 years 7 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
155
Voted
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 7 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi
160
Voted
CAISE
2009
Springer
15 years 6 months ago
Ontology-Based Description and Discovery of Business Processes
Just like web services, business processes can be stored in public repositories to be shared and used by third parties, e.g., as building blocks for constructing new business proce...
Khalid Belhajjame, Marco Brambilla
AAAI
2008
15 years 5 months ago
Linking Social Networks on the Web with FOAF: A Semantic Web Case Study
One of the core goals of the Semantic Web is to store data in distributed locations, and use ontologies and reasoning to aggregate it. Social networking is a large movement on the...
Jennifer Golbeck, Matthew Rothstein
124
Voted
CONEXT
2008
ACM
15 years 5 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...