Sciweavers

1611 search results - page 229 / 323
» Experimental Integration of Planning in a Distributed Contro...
Sort
View
HPDC
2010
IEEE
15 years 5 months ago
Detouring and replication for fast and reliable internet-scale stream processing
iFlow is a replication-based system that can achieve both fast and reliable processing of high volume data streams on the Internet scale. iFlow uses a low degree of replication in...
Christopher McConnell, Fan Ping, Jeong-Hyon Hwang
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
SACMAT
2009
ACM
15 years 10 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
AROBOTS
2002
106views more  AROBOTS 2002»
15 years 4 months ago
Tracking Targets Using Multiple Robots: The Effect of Environment Occlusion
This paper addresses the problem of tracking multiple targets using a network of communicating robots and stationary sensors. We introduce a Region-based Approach which controls r...
Boyoon Jung, Gaurav S. Sukhatme
CONEXT
2008
ACM
15 years 6 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...