Lubke et al., 2004 - Google Patents
Applications for mobile agents in peer-to-peer-networksLubke et al., 2004
View PDF- Document ID
- 13935289925359853229
- Author
- Lubke D
- Gómez J
- Publication year
- Publication venue
- Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.
External Links
Snippet
Peer-to-peer-networking has lately become one of the most popular applications used in the Internet. Today's applications allow users to share files, offer processing power to other entities and do collaboration by using software which is relatively easy to use. This paper …
- 239000003795 chemical substances by application 0 description 100
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hernández Ramos et al. | Mqtt security: A novel fuzzing approach | |
US8095658B2 (en) | Method and system for externalizing session management using a reverse proxy server | |
US7389328B2 (en) | Method for control of personal data | |
Milojicic et al. | Peer-to-peer computing | |
US7903656B2 (en) | Method and system for message routing based on privacy policies | |
ES2278066T3 (en) | OFFERING OF SERVICES ADDED IN A DISTRIBUTED INFORMATIC ENVIRONMENT. | |
US9037711B2 (en) | Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes | |
US8831993B2 (en) | Techniques for sharing virtual machine (VM) resources | |
CN101043478B (en) | Service gateway and method for implementing secure message processing | |
US20030110266A1 (en) | Apparatus and method of using session state data across sessions | |
CN101981887A (en) | System and method for configuration and fine-grained policy-driven web content detection and rewriting | |
Fremantle et al. | Web api management meets the internet of things | |
US8996715B2 (en) | Application firewall validation bypass for impromptu components | |
CN102710559A (en) | A Method of Reverse Proxy Technology Realizing Digital Document Resource Gateway | |
FI111879B (en) | Management of user profile information in a telecommunications network | |
Lubke et al. | Applications for mobile agents in peer-to-peer-networks | |
US20050228848A1 (en) | Method and system for operating a peer network | |
EP3170089B1 (en) | Brokering data access requests and responses | |
Aloufi et al. | Performance analysis of the hybrid iot security model of mqtt and uma | |
Da Silva et al. | CUBE system: a REST and RESTful based platform for liquid software approaches | |
Caviglione et al. | The “Dark Side” and The “Force” Of The Peer-to-Peer Computing Saga | |
Palakollu | Socket Programming | |
Herman et al. | Creating the virtual enterprise with VE gateways | |
Lübke et al. | Designing a foundation for mobile agents in peer-to-peer networks | |
FI113303B (en) | Arrangements for processing customer requests |