Sciweavers

8080 search results - page 280 / 1616
» From Computer Networks to Agent Networks
Sort
View
FCT
2009
Springer
15 years 10 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
DSOM
2004
Springer
15 years 9 months ago
Policy-Based Resource Assignment in Utility Computing Environments
In utility computing environments, multiple users and applications are served from the same r esource pool. To maintain service level objectives and maintain high levels of utiliza...
Cipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk...
MOBICOM
2010
ACM
15 years 4 months ago
Intentional networking: opportunistic exploitation of mobile network diversity
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
PERCOM
2006
ACM
16 years 3 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2008
ACM
15 years 10 months ago
An Autonomic Context Management System for Pervasive Computing
Abstract—Context-aware applications adapt to changing computing environments or changing user circumstances/tasks. Context information that supports such adaptations is provided ...
Peizhao Hu, Jadwiga Indulska, Ricky Robinson