We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
The significant speed-gap between processor and memory and the limited chip memory bandwidth make last-level cache performance crucial for future chip multiprocessors. To use the...
— WLAN VoIP capacity is known to be very low due to the effects of overheads at various protocol layers. An IEEE 802.11b access point (AP) operating at 11 Mbps for example, can s...
We address the problem of optimizing the distribution of partially replicated databases over a computer network. Replication is used to increase data availability in the presence ...
Sarah Abdul-Wahid, Razvan Andonie, Joseph Lemley, ...
Recent growth in computing devices from the smartphone to the desktop computer has led to users interacting with multiple computing devices throughout the course of the day. Modern...
Daniel MacCormac, Mark Deegan, Fred Mtenzi, Brenda...