Sciweavers

1665 search results - page 278 / 333
» Monitoring Timing Constraints in Distributed Real-Time Syste...
Sort
View
ATAL
2007
Springer
15 years 4 months ago
Interactions between market barriers and communication networks in marketing systems
We investigate a framework where agents search for satisfying products by using referrals from other agents. Our model of a mechanism for transmitting word-of-mouth and the result...
Ian N. Durbach, Jan H. Hofmeyr
JHSN
2006
267views more  JHSN 2006»
14 years 9 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
ICSE
2004
IEEE-ACM
15 years 10 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
MTA
2006
115views more  MTA 2006»
14 years 9 months ago
Tree-assisted gossiping for overlay video distribution
Given its readily deployable nature and broad applications for digital entertainment, video streaming through overlay networks has received much attention recently. While a tree to...
Jiangchuan Liu, Ming Zhou
BMCBI
2008
129views more  BMCBI 2008»
14 years 10 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...