Sciweavers

1512 search results - page 240 / 303
» Some Methodological Issues for Intelligent Information Syste...
Sort
View
ACSAC
2005
IEEE
15 years 7 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
EWCBR
2004
Springer
15 years 7 months ago
Software Design Retrieval Using Bayesian Networks and WordNet
The complexity of software systems makes design reuse a necessary task in the software development process. CASE tools can provide cognitive assistance in this task, helping the so...
Paulo Gomes
COOPIS
2002
IEEE
15 years 6 months ago
A Decentralized Algorithm for Coordinating Independent Peers: An Initial Examination
Abstract. Peer-to-peer (P2P) applications are composed of a distributed collection of peers that cooperate in order to perform some common task. Though P2P applications have attrac...
Girish Suryanarayana, Richard N. Taylor
116
Voted
CCGRID
2010
IEEE
15 years 2 months ago
Dynamic TTL-Based Search in Unstructured Peer-to-Peer Networks
Abstract--Resource discovery is a challenging issue in unstructured peer-to-peer networks. Blind search approaches, including flooding and random walks, are the two typical algorit...
Imen Filali, Fabrice Huet
IPTPS
2005
Springer
15 years 7 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...