Sciweavers

2321 search results - page 123 / 465
» A Protocol for a Distributed Recommender System
Sort
View
WOA
2001
15 years 2 months ago
A Contract Decommitment Protocol for Automated Negotiation in Time Variant Environments
Negotiation is a fundamental mechanism in distributed multi-agent systems. Since negotiation is a time-spending process, in many scenarios agents have to take into account the pas...
Federico Bergenti, Agostino Poggi, Matteo Somacher
ICDCS
2006
IEEE
15 years 7 months ago
DNScup: Strong Cache Consistency Protocol for DNS
Effective caching in Domain Name System (DNS) is critical to its performance and scalability. Existing DNS only supports weak cache consistency by using the Time-To-Live (TTL) mec...
Xin Chen, Haining Wang, Shansi Ren
SOSP
2003
ACM
15 years 10 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
15 years 8 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
WOLLIC
2010
Springer
15 years 6 months ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...