Sciweavers

1052 search results - page 155 / 211
» Distributed Logic Programming using Mobile Agents
Sort
View
105
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 22 days ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
DAC
2003
ACM
16 years 1 months ago
Extending the lifetime of a network of battery-powered mobile devices by remote processing: a markovian decision-based approach
This paper addresses the problem of extending the lifetime of a batterypowered mobile host in a client-server wireless network by using task migration and remote processing. This ...
Peng Rong, Massoud Pedram
99
Voted
AAAI
1994
15 years 2 months ago
Using Knowledge Acquisition and Representation Tools to Support Scientific Communities
Widespread access to the Internet has led to the formation of geographically dispersed scientific communities collaborating through the network. The tools supporting such collabor...
Brian R. Gaines, Mildred L. G. Shaw
129
Voted
EUSAI
2007
Springer
15 years 2 months ago
A Compiler for the Smart Space
Developing applications for smart spaces is a challenging task. Most programming systems narrowly focus on the embedded computer infrastructure and neglect the spatial aspect of th...
Urs Bischoff, Gerd Kortuem
96
Voted
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
15 years 21 days ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu