IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Virtual machine monitors, especially when used for server consolidation, need to enforce a predefined sharing of resources among the running virtual machines. We propose a new me...
Emerging large scale utility computing systems like Grids promise computing and storage to be provided to end users as a utility. System management services deployed in the middle...
As the proliferation of the Internet, especially World Wide Web, numerous information resources have been constructed. The characteristics of information resources on the Internet...
Kangchan Lee, Jae Hong Min, Kishik Park, Kyuchul L...
Abstract. This paper presents a general multi-agent architecture for the management of businessprocesses,and an agent designthat has been implemented within such a system. The auto...
Timothy J. Norman, Nicholas R. Jennings, Peyman Fa...