Sciweavers

7918 search results - page 1202 / 1584
» Model Composition Directives
Sort
View
IFIP
2005
Springer
15 years 10 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
ISPA
2005
Springer
15 years 10 months ago
Proof of Service in a Hybrid P2P Environment
Abstract. In a hybrid peer-to-peer environment, clients can either directly download data from their server, or share data with each other. In order to create incentives for client...
Jun Li, Xun Kang
LOCA
2005
Springer
15 years 10 months ago
Web-Enhanced GPS
Location-based services like reminders, electronic graffiti, and tourist guides normally require a custom, location-sensitive database that must be custom-tailored for the applicat...
Ramaswamy Hariharan, John Krumm, Eric Horvitz
130
Voted
PROMAS
2005
Springer
15 years 10 months ago
Declarative Agent Programming Support for a FIPA-Compliant Agent Platform
Multi-agent system(MAS) is a blooming research area, which exhibits a new paradigm for the design, modelling and implementation of complex systems. A significant amount of effort...
Mengqiu Wang, Mariusz Nowostawski, Martin K. Purvi...
163
Voted
DCOSS
2005
Springer
15 years 10 months ago
Collaborative Sensing Using Sensors of Uncoordinated Mobility
Abstract— Wireless sensor networks are useful for monitoring physical parameters and detecting objects or substances in an area. Most ongoing research consider the use of either ...
Kuang-Ching Wang, Parmesh Ramanathan
« Prev « First page 1202 / 1584 Last » Next »