Sciweavers

7683 search results - page 1479 / 1537
» Distributed Computing with the CLAN Network
Sort
View
ATAL
2008
Springer
15 years 5 months ago
Reusing models in multi-agent simulation with software components
on models are abstract representations of systems one wants to study through computer simulation. In multiagent based simulation, such models usually represent agents and their re...
Paulo Salem da Silva, Ana Cristina Vieira de Melo
ATAL
2008
Springer
15 years 5 months ago
Cooperative search for optimizing pipeline operations
We present an application of a multi-agent cooperative search approach to the problem of optimizing gas pipeline operations, i.e. finding control parameters for a gas transmission...
T. Mora, Abu B. Sesay, Jörg Denzinger, Hossei...
FORTE
2007
15 years 4 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
ISSA
2008
15 years 4 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 4 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
« Prev « First page 1479 / 1537 Last » Next »