Sciweavers

2171 search results - page 428 / 435
» Cooperative Validation in Distributed Control Systems Design
Sort
View
MAGS
2008
104views more  MAGS 2008»
14 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
15 years 9 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
SIGMOD
2001
ACM
118views Database» more  SIGMOD 2001»
15 years 9 months ago
Proxy-Server Architectures for OLAP
Data warehouses have been successfully employed for assisting decision making by offering a global view of the enterprise data and providing mechanisms for On-Line Analytical proc...
Panos Kalnis, Dimitris Papadias
FMN
2009
Springer
99views Multimedia» more  FMN 2009»
15 years 4 months ago
Interest-Based Peer-to-Peer Group Management
Abstract. Peer-to-Peer systems become popular applications but suffer from insufficient resource availability which is caused by free-riders and inefficient lookup algorithms. To a...
Jun Lei, Xiaoming Fu
72
Voted
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh