Information Technology Reference
In-Depth Information
18. J.-S. R. Jang and H.-R. Lee. 2001, October. Hierarchical filtering method for
content-based music retrieval via acoustic input. In Proceedings of the 9th ACM
International Conference on Multimedia MULTIMEDIA'01.
19. S. Hammiche, S. Benbernou, M.-S. Hacid, and A. Vakali. 2004. Semantic retrieval
of multimedia data. In Proceedings of the 2nd ACM International Workshop on
Multimedia Databases MMDB'04.
20. S. Saroiu, K. P. Gummadi, and S. D. Gribble. 2002. Measuring and analyzing the
characteristics of Napster and Gnutella hosts, 2006, 2003. www.mpi-sws.mpg.
de/~gummadi/papers/mm.pdf.
21. The Gnutella protocol specification v0.4. 2006. http://www.stanford.edu/
class/cs2446/gnutella_protocol_0.4.pdf
22. The annotated Gnutella protocol specification v0.4. 2006. http://rfc-gnutella.
sourceforge.net/developer/stable/index.html
23. S. Botros, S. Waterhouse. August 2001. “Search in JXTA and other distributed net-
works,” First International Conference on Peer-to-Peer Computing, pp. 30-35.
24. D. Tsoumakos and N. Roussopoulos. 2006. Analysis and comparison of P2P
search methods. In Proceedings of the 1st International Conference on Scalable
Information Systems InfoScale'06.
25. E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. 2005. A survey and com-
parison of peer-to-peer overlay network schemes. IEEE Communications Survey
and Tutorial 7 (2):72-93.
26. C. Yang. 2003. Peer-to-peer architecture for content-based music retrieval on
acoustic data. In Proceedings of the 12th International Conference on World
Wide Web WWW'03.
27. I. A. Klampanos and J. M. Jose. 2004. An architecture for information retrieval
over semi-collaborating peer-to-peer networks. In Proceedings of the ACM
symposium on Applied Computing SAC'04.
28. J. Lu and J. Callan. 2003. Content-based retrieval in hybrid peer-to-peer net-
works. In Proceedings of the 12th International Conference on Information and
Knowledge Management CIKM'03.
29. D.Verdon. 2006, July-August. Security policies and the software developer.
IEEE Security and Privacy 4 (4):42-49.
30. C. Clifton, M. Kantarcio, A. H. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and
D. Suciu. 2004. Privacy-preserving data integration and sharing. In Proceedings
of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and
Knowledge Discovery DMKD'04.
31. B. A. Bouna and R. Chbeir. 2006. Multimedia-based authorization and access
control policy specification. In Proceedings of the 3rd ACM Workshop on Secure
Web Services SWS'06.
32. D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. 1999. A role-based access con-
trol model and reference implementation within a corporate intranet. ACM
Transactions on Information and System Security (TISSEC) 1 (2):12-41.
33. A. F. Abigail, J. Sellen, M. Aitken, Ss Hodges, C. Rother, and K. Wood. 2007. Do
life-logging technologies support memory for the past?: An experimental study
using sensecam. In Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems CHI'07.
34. Xiang, X., Y. Shi, and L. Guo. 2004. “Rich metadata searches using the JXTA
content manager service.” in 18th International Conference on Advanced
Information Networking and Applications AINA 2004 (1)pp. 624-629.
Search WWH ::




Custom Search