Sciweavers

871 search results - page 51 / 175
» A Decentralized Authorization Architecture
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
Associative Search in Peer to Peer Networks: Harnessing Latent Semantics
— The success of a P2P file-sharing network highly depends on the scalability and versatility of its search mechanism. Two particularly desirable search features are scope (abil...
Edith Cohen, Amos Fiat, Haim Kaplan
SEUS
2008
IEEE
15 years 4 months ago
Data Services in Distributed Real-Time Embedded Systems
The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide app...
Woochul Kang, Sang Hyuk Son
CCR
2006
101views more  CCR 2006»
14 years 9 months ago
Reflections on network architecture: an active networking perspective
After a long period when networking research seemed to be focused mainly on making the existing Internet work better, interest in "clean slate" approaches to network arc...
Kenneth L. Calvert
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
14 years 8 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
ESAW
2009
Springer
15 years 4 months ago
Agent Architectures for Compliance
A Normative Multi-Agent System consists of autonomous agents who must comply with social norms. Different kinds of norms make different assumptions about the cognitive architecture...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan