Sciweavers

1134 search results - page 154 / 227
» Distributed Proving in Access-Control Systems
Sort
View
ICSE
2004
IEEE-ACM
16 years 3 months ago
Using Web Service Technologies to Create an Information Broker: An Experience Report
This paper reports on our experiences with using the emerging web service technologies and tools to create a demonstration information broker system as part of our research into i...
Mark Turner, Fujun Zhu, Ioannis A. Kotsiopoulos, M...
CDC
2008
IEEE
130views Control Systems» more  CDC 2008»
15 years 9 months ago
Stochastic multiscale approaches to consensus problems
Abstract— While peer-to-peer consensus algorithms have enviable robustness and locality for distributed estimation and computation problems, they have poor scaling behavior with ...
Jong-Han Kim, Matthew West, Sanjay Lall, Eelco Sch...
PRDC
2006
IEEE
15 years 9 months ago
Leader Election in the Timed Finite Average Response Time Model
The finite average response time model is a very weak distributed systems model: it permits runs with unbounded transmission and processing delays and it does not bound the relat...
Christof Fetzer, Martin Süßkraut
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
IPPS
2007
IEEE
15 years 9 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram