Sciweavers

948 search results - page 158 / 190
» Analysis of SITA policies
Sort
View
EUROPKI
2006
Springer
15 years 3 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
VLDB
1995
ACM
73views Database» more  VLDB 1995»
15 years 3 months ago
Hot Block Clustering for Disk Arrays with Dynamic Striping
RAID5 disk arrays provide high performance and high reliability for reasonable cost. However RAID5 suffers a performance penalty during block updates. In order to overcome this pr...
Kazuhiko Mogi, Masaru Kitsuregawa
AIIDE
2008
15 years 2 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
WSC
2008
15 years 2 months ago
Parallel discrete-event simulation of population dynamics
Research in parallel simulation has been around for more than two decades. However, the number of papers reporting on its application to real world problems is limited. At the 200...
Bhakti Satyabudhi, Stephan Onggo
ATAL
2005
Springer
15 years 1 months ago
Automated resource-driven mission phasing techniques for constrained agents
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
Jianhui Wu, Edmund H. Durfee