Sciweavers

371 search results - page 72 / 75
» Adaptation hiding modularity
Sort
View
ISW
2004
Springer
15 years 3 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
SELMAS
2004
Springer
15 years 3 months ago
A Generative Approach for Multi-agent System Development
The development of Multi-Agent Systems (MASs) involves special concerns, such as interaction, adaptation, autonomy, among others. Many of these concerns are overlapping, crosscut e...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...
WCW
2004
Springer
15 years 3 months ago
Distributed Hashtable on Pre-structured Overlay Networks
Internet overlay services must adapt to the substrate network topology and link properties to achieve high performance. A common overlay structure management layer is desirable fo...
Kai Shen, Yuan Sun
AOSD
2003
ACM
15 years 2 months ago
Quantifying aspects in middleware platforms
Middleware technologies such as Web Services, CORBA and DCOM have been very successful in solving distributed computing problems for a large family of application domains. As midd...
Charles Zhang, Hans-Arno Jacobsen
89
Voted
MMB
1999
Springer
249views Communications» more  MMB 1999»
15 years 1 months ago
A Development Platform for the Design and Optimization of Mobile Radio Networks
The rapidly increasing traffic demand from mobile users forces network operators and service providers to extend and optimize existing networks as well as to plan entirely new mo...
Jürgen Deissner, Gerhard Fettweis, Jörg ...