Sciweavers

8080 search results - page 184 / 1616
» From Computer Networks to Agent Networks
Sort
View
108
Voted
CONEXT
2009
ACM
15 years 4 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
154
Voted
KES
2007
Springer
15 years 9 months ago
Breedbot: An Edutainment Robotics System to Link Digital and Real World
The paper describes Breedbot an edutainment software and hardware system that could be used to evolve autonomous agents in digital (software) world and to transfer the evolved mind...
Orazio Miglino, Onofrio Gigliotta, Michela Pontico...
110
Voted
POLICY
2004
Springer
15 years 9 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
140
Voted
AINA
2004
IEEE
15 years 7 months ago
An Identity-based Ring Signature Scheme from Bilinear Pairings
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. In this paper we propose an identity-based ring signature scheme from ...
Chih-Yin Lin, Tzong-Chen Wu
113
Voted
BROADNETS
2004
IEEE
15 years 7 months ago
Decoupling Packet Loss from Blocking in Proactive Reservation-Based Switching
We consider the maximization of network throughput in buffer-constrained optical networks using aggregate bandwidth allocation and reservation-based transmission control. Assuming...
Mahmoud Elhaddad, Rami G. Melhem, Taieb Znati