Sciweavers

504 search results - page 68 / 101
» Network management views using delegated agents
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack
ICCS
2005
Springer
15 years 3 months ago
Optimization of Bandwidth Allocation in Communication Networks with Penalty Cost
In this paper, we present an analysis on optimization and risk management in Communication Networks (CNs). The model is proposed for offline traffic engineering optimization, which...
Jun Wu, Wuyi Yue, Shouyang Wang
ICDCN
2011
Springer
14 years 1 months ago
Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time
This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surve...
Congduc Pham
ECOOPW
1999
Springer
15 years 2 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
AAAI
2006
14 years 11 months ago
Sound and Efficient Inference with Probabilistic and Deterministic Dependencies
Reasoning with both probabilistic and deterministic dependencies is important for many real-world problems, and in particular for the emerging field of statistical relational lear...
Hoifung Poon, Pedro Domingos