Sciweavers

1122 search results - page 162 / 225
» Modelling Cooperative Multi-agent Systems
Sort
View
JHSN
2006
267views more  JHSN 2006»
15 years 16 days ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
88
Voted
DSN
2006
IEEE
15 years 6 months ago
The Startup Problem in Fault-Tolerant Time-Triggered Communication
Fault-tolerant time-triggered communication relies on the synchronization of local clocks. The startup problem is the problem of reaching a sufficient degree of synchronization a...
Wilfried Steiner, Hermann Kopetz
88
Voted
PUC
2008
141views more  PUC 2008»
15 years 1 days ago
A calendar based Internet content pre-caching agent for small computing devices
We described in earlier publications the principles of a system where internet content would be pre-cached, based on contextual information obtained from a user's electronic ...
Andreas Komninos, Mark D. Dunlop
FTDCS
2003
IEEE
15 years 5 months ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
ADHOC
2007
169views more  ADHOC 2007»
15 years 21 days ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone