Sciweavers

2365 search results - page 33 / 473
» Data access in distributed simulations of multi-agent system...
Sort
View
TWC
2008
112views more  TWC 2008»
14 years 9 months ago
Service time analysis of a distributed medium access control scheme
Abstract--Distributed medium access control (MAC) is essential for a wireless network without a central controller. In previous work of the authors, a distributed MAC scheme has be...
Hai Jiang, Ping Wang, Weihua Zhuang, H. Vincent Po...
CORR
2010
Springer
224views Education» more  CORR 2010»
14 years 9 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam
CSFW
2003
IEEE
15 years 3 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
DB
1998
119views more  DB 1998»
14 years 9 months ago
SimDS: A Simulation Environment for the Design of Distributed Database Systems
Design of a distributed transaction processing system is a complex process. The paper describes the design and implementation of a general purpose scalable simulation environment ...
Alok R. Chaturvedi, Samir Gupta, Subhajyoti Bandyo...
IFIP
2005
Springer
15 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan