Sciweavers

299 search results - page 51 / 60
» Re-engineering enterprise security
Sort
View
78
Voted
ICN
2005
Springer
15 years 3 months ago
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocol...
Tim Schattkowsky
WETICE
2003
IEEE
15 years 3 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deï¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
AGENTS
1997
Springer
15 years 2 months ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes
101
Voted
AGENTS
1997
Springer
15 years 2 months ago
Integrating Communicative Action, Conversations and Decision Theory to Coordinate Agents
The coordination problem in multi-agent systems is the problem of managing dependencies between the activities of autonomous agents, in conditions of incomplete knowledge about th...
Mihai Barbuceanu, Mark S. Fox
ICDCS
2010
IEEE
15 years 2 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang