Sciweavers

1011 search results - page 95 / 203
» Implementing Distributed Controllers for Systems with Priori...
Sort
View
POLICY
2009
Springer
15 years 11 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
ICCD
2002
IEEE
122views Hardware» more  ICCD 2002»
16 years 1 months ago
Using Offline and Online BIST to Improve System Dependability - The TTPC-C Example
Fault-tolerant distributed real-time systems are presently facing a lot of new challenges. Although many techniques provide effective masking of node failures on the architectural...
Andreas Steininger, Johann Vilanek
ECAI
1994
Springer
15 years 9 months ago
Belief Revision in Multi-Agent Systems
The ability to respond sensibly to changing and conflicting beliefs is an integral part of intelligent agency. To this end, we outline the design and implementation of a Distribute...
Benedita Malheiro, Nicholas R. Jennings, Eugenio O...
IPPS
2005
IEEE
15 years 10 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
ACSC
2005
IEEE
15 years 10 months ago
Flexible Exclusion Control for Composite Objects
We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a ...
Abdelsalam Shanneb, John Potter