You are here

Bibliography

Export 98 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2007
Saballus B, Eickhold J, Fuhrmann T. Towards a Distributed Java VM in Sensor Networks using Scalable Source Routing. In: 6. Fachgespraech Sensornetzwerke der GI/ITG Fachgruppe ''Kommunikation und Verteilte Systeme''. 6. Fachgespraech Sensornetzwerke der GI/ITG Fachgruppe ''Kommunikation und Verteilte Systeme''. Aachen, Germany; 2007. pp. 47–50. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.7724
2008
Saballus B, Eickhold J, Fuhrmann T. Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine. In: Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM 2008). Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM 2008). Cap Esterel, France: IEEE Computer Society; 2008. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2009
Saballus B, Fuhrmann T. Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems. In: HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. New York, NY, USA: ACM; 2009. pp. 59–60. Available from: http://portal.acm.org/citation.cfm?id=1551609.1551621#
2012
Sadiq U, Kumar M, Wright M. CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM; 2012. Available from: http://doi.acm.org/10.1145/2387238.2387253
2005
Sahai A, Waters BR. Fuzzy Identity-Based Encryption. In: EUROCRYPT'05 Workshop on the Theory and Application of of Cryptographic Techniques. Vol. 3494. EUROCRYPT'05 Workshop on the Theory and Application of of Cryptographic Techniques. Aarhus, Denmark : Springer; 2005.
2005
Sailhan F, Issarny V. Scalable Service Discovery for MANET. In: PERCOM '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. PERCOM '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. Washington, DC, USA: IEEE Computer Society; 2005. pp. 235–244. Available from: http://portal.acm.org/citation.cfm?id=1049775#
2007
Saito K, Morino E, Suko Y, Suzuki T, Murai J. Local Production, Local Consumption: Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure. In: SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. Hiroshima, Japan: IEEE Computer Society; 2007. p. 58.
2006
Saito K, Morino E, Murai J. Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. In: ARES'06. Proceedings of the First International Conference on Availability, Reliability and Security. ARES'06. Proceedings of the First International Conference on Availability, Reliability and Security. Vienna, Austria: IEEE Computer Society; 2006. pp. 764–771. Available from: http://dl.acm.org/citation.cfm?id=1130897.1131000
Saito K, Morino E, Murai J. Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems. In: ARES'06. Proceedings of the First International Conference on Availability, Reliability and Security. ARES'06. Proceedings of the First International Conference on Availability, Reliability and Security. Vienna, Austria: IEEE Computer Society; 2006. pp. 764–771. Available from: http://dl.acm.org/citation.cfm?id=1130897.1131000
Saito K. i-WAT: The Internet WAT System - An Architecture for Maintaining Trust and Facilitating Peer-to-Peer Barter Relationships. Graduate School of Media and Governance [Internet]. 2006 ;Philosophy (Media and Governance):231. Available from: http://www.sfc.wide.ad.jp/dissertation/ks91_e.html
2003
Salem NB, Buttyán L, Hubaux J-P, Jakobsson M. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In: MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM; 2003. pp. 13–24. Available from: http://portal.acm.org/citation.cfm?id=778418#
2001
Neff AC. A Verifiable Secret Shuffle and its Application to E-Voting. In: Samarati P {Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}. {Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}. ACM Press; 2001. pp. 116–125. Available from: http://portal.acm.org/citation.cfm?id=502000
2006
Sandberg O. Distributed Routing in Small-World Networks. In: Algorithm Engineering and Experiments. Algorithm Engineering and Experiments. SIAM; 2006. Available from: http://www.math.chalmers.se/ ossa/wrt.html
2005
Sanghavi S, Hajek B. A new mechanism for the free-rider problem. In: P2PEcon'05. Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. P2PEcon'05. Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Philadelphia, Pennsylvania, USA: ACM; 2005. pp. 122–127. Available from: http://doi.acm.org/10.1145/1080192.1080200
2002
Saroiu S, Gummadi KP, Gribble SD. A Measurement Study of Peer-to-Peer File Sharing Systems. In: Multimedia Computing and Networking (MMCN),. Multimedia Computing and Networking (MMCN),. San Jose; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.4223&rep=rep1&type=pdf
2005
Sassaman L, Cohen B, Mathewson N. The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005). Arlington, VA, USA: ACM New York, NY, USA; 2005. Available from: http://portal.acm.org/citation.cfm?id=1102199.1102201
2001
Scarlata V, Levine BN, Shields C. Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Network Protocols, 2001. Ninth International Conference on . Network Protocols, 2001. Ninth International Conference on . ; 2001. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.7821&rep=rep1&type=url&i=0
2009
Schadd FC. Monte-Carlo Search Techniques in the Modern Board Game Thurn and Taxis. Knowledge Engineering. 2009 ;Master Science of Artificial Intelligence:93.

Pages