Sciweavers

960 search results - page 71 / 192
» The disaster of central control
Sort
View
ADHOCNOW
2009
Springer
14 years 9 months ago
A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks
Broadcasting is a commonly used feature in wireless networking, e.g. for file distribution, re-tasking, event notification, or miscellaneous maintenance. Due to the limited resourc...
Christopher Miller, Christian Poellabauer
ICTAI
2009
IEEE
15 years 6 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
83
Voted
SIGCOMM
2009
ACM
15 years 6 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
75
Voted
INFOSCALE
2006
ACM
15 years 5 months ago
Information retrieval in a peer-to-peer environment
Due to rapid information growth, peer-to-peer (P2P) systems have become a promising alternative to centralized, client/server-based approaches for large-scale data sharing. By all...
Dik Lun Lee, Dyce Jing Zhao, Qiong Luo
INFOSCALE
2006
ACM
15 years 5 months ago
PENS: an algorithm for density-based clustering in peer-to-peer systems
Huge amounts of data are available in large-scale networks of autonomous data sources dispersed over a wide area. Data mining is an essential technology for obtaining hidden and v...
Mei Li, Guanling Lee, Wang-Chien Lee, Anand Sivasu...