Sciweavers

160 search results - page 26 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
INDOCRYPT
2001
Springer
15 years 4 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
IWAI
1999
Springer
15 years 3 months ago
Redesigning the Agents' Decision Machinery
In a multi-agent system, agents must decide what to do and by what order. Autonomy is a key notion in such a system, since it is mainly the autonomy of the agents that makes the en...
Luis Antunes, Helder Coelho
RTSS
2005
IEEE
15 years 5 months ago
Enhancing the Robustness of Distributed Real-Time Middleware via End-to-End Utilization Control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Chenyang Lu, Xenofon D. Koutsoukos
GRID
2004
Springer
15 years 5 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao
92
Voted
JSS
2007
99views more  JSS 2007»
14 years 11 months ago
FC-ORB: A robust distributed real-time embedded middleware with end-to-end utilization control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Yingming Chen, Chenyang Lu, Xenofon ...