Sciweavers

688 search results - page 102 / 138
» Extracting the abstraction pyramid from complex networks
Sort
View
DBISP2P
2006
Springer
71views Database» more  DBISP2P 2006»
15 years 1 months ago
Oscar: Small-World Overlay for Realistic Key Distributions
Abstract. The research on P2P systems which support skewed key distributions has rapidly advanced in the recent years. Yet, the assumptions on the skews we are dealing with remaine...
Sarunas Girdzijauskas, Anwitaman Datta, Karl Abere...
AAMAS
2007
Springer
14 years 10 months ago
A formal framework for connective stability of highly decentralized cooperative negotiations
Abstract. Multiagent cooperative negotiation is a promising technique for modeling and controlling complex systems. Effective and flexible cooperative negotiations are especially...
Francesco Amigoni, Nicola Gatti
INFOCOM
2003
IEEE
15 years 3 months ago
Integrity for Virtual Private Routed Networks
Abstract— The term Virtual Private Network (VPN) encompasses a wide array of diverse technologies and network architectures. All VPNs should provide users with the isolation and ...
Randy Bush, Timothy Griffin
92
Voted
WOA
2001
14 years 11 months ago
How to Support Adaptive Mobile Applications
The Mobile Agent (MA) paradigm seems to be a promising solution for the design and development of distributed value-added services. However, mobility has added complexity to the d...
Antonio Corradi, Rebecca Montanari, Gianluca Tonti...
ACSAC
2008
IEEE
15 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh