Sciweavers

160 search results - page 26 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
INDOCRYPT
2001
Springer
15 years 1 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
IWAI
1999
Springer
15 years 1 months ago
Redesigning the Agents' Decision Machinery
In a multi-agent system, agents must decide what to do and by what order. Autonomy is a key notion in such a system, since it is mainly the autonomy of the agents that makes the en...
Luis Antunes, Helder Coelho
112
Voted
RTSS
2005
IEEE
15 years 3 months ago
Enhancing the Robustness of Distributed Real-Time Middleware via End-to-End Utilization Control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Chenyang Lu, Xenofon D. Koutsoukos
GRID
2004
Springer
15 years 2 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao
JSS
2007
99views more  JSS 2007»
14 years 9 months ago
FC-ORB: A robust distributed real-time embedded middleware with end-to-end utilization control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Yingming Chen, Chenyang Lu, Xenofon ...