Sciweavers

1692 search results - page 210 / 339
» Practical, distributed network coordinates
Sort
View
116
Voted
SPAA
2010
ACM
15 years 6 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
15 years 7 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler
ATAL
2003
Springer
15 years 7 months ago
Norm adoption in the NoA agent architecture
Agents based on reactive planning architectures use pre-specified plans as behaviour specifications. Normative agents are motivated by norms in their behaviour: obligations motiva...
Martin J. Kollingbaum, Timothy J. Norman
ECSCW
2003
15 years 3 months ago
Moving to get aHead: Local Mobility and Collaborative Work
: Local mobility is a central aspect of collaborative work that is in need of close analysis. Between the face-to-face interaction of offices or control rooms and longdistance inte...
Jakob E. Bardram, Claus Bossen
JHSN
2006
96views more  JHSN 2006»
15 years 1 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...