Sciweavers

1401 search results - page 196 / 281
» Interactive Configuration Management for Distributed Object ...
Sort
View
WSC
1997
14 years 11 months ago
Million Dollar Logistic Decisions Using Simulation
This paper presents the development of a flexible simulation model of the rail operations at the Tropicana facility in Bradenton, Florida. The complexity of the process and system...
Michael Carr, Howard Way
90
Voted
WOA
2001
14 years 11 months ago
A Contract Decommitment Protocol for Automated Negotiation in Time Variant Environments
Negotiation is a fundamental mechanism in distributed multi-agent systems. Since negotiation is a time-spending process, in many scenarios agents have to take into account the pas...
Federico Bergenti, Agostino Poggi, Matteo Somacher
83
Voted
IDMS
1999
Springer
117views Multimedia» more  IDMS 1999»
15 years 2 months ago
Tailoring Protocols for Dynamic Network Conditions and User Requirements
This paper shows the use of protocols dynamically generated for a particular network environment and an application’s requirements. We have developed a novel system called PNUT (...
R. De Silva, Aruna Seneviratne
ICS
2011
Tsinghua U.
14 years 1 months ago
Hystor: making the best use of solid state drives in high performance storage systems
With the fast technical improvement, flash memory based Solid State Drives (SSDs) are becoming an important part of the computer storage hierarchy to significantly improve perfo...
Feng Chen, David A. Koufaty, Xiaodong Zhang
85
Voted
NDSS
2000
IEEE
15 years 2 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...