Sciweavers

360 search results - page 54 / 72
» A Distributed and Autonomic Virtual Network Mapping Framewor...
Sort
View
117
Voted
NSPW
2006
ACM
15 years 9 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
207
Voted
AINA
2011
IEEE
14 years 7 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
130
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
132
Voted
ATAL
2005
Springer
15 years 9 months ago
Optimal design in collaborative design network
We consider a multiagent system whose task is to aid componentcentered design by collaborative designers in a supply chain. In the earlier work, collaborative design networks are ...
Y. Xiang, J. Chen, William S. Havens
122
Voted
SPAA
2006
ACM
15 years 9 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler