Sciweavers

4445 search results - page 120 / 889
» Reflective Authorization Systems
Sort
View
DSN
2004
IEEE
15 years 8 months ago
Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization
The goal of this paper is to assess the value of simple features that are widely available in off-the-shelf CORBA and Java platforms for the implementation of faulttolerance mecha...
Taha Bennani, Laurent Blain, Ludovic Courtè...
IJCIS
2000
106views more  IJCIS 2000»
15 years 4 months ago
Agents in Overalls: Experiences and Issues in the Development and Deployment of Industrial Agent-Based Systems
Agent technologies have steadily matured in moving from the research laboratory to industrial application over the last ten years. Numerous systems have been deployed or are under...
H. Van Dyke Parunak
GLOBECOM
2010
IEEE
15 years 2 months ago
Information Theoretic Optimal Broadband Matching for Communication Systems
We present an information theoretic perspective on optimal broadband matching. Most of the broadband matching and communication theory literature assumes a frequencyflat reflection...
Pawandeep S. Taluja, Brian L. Hughes
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 4 months ago
The Immune Network System with Chaotic Behavior
In this paper the immune network system was presented by the sequence of species with new immunological components allowing more plausible to reflect the immune response processes....
Algis Garliauskas
PDS
1996
15 years 5 months ago
Towards a theory of shared data in distributed systems
We have developed a theory of sharing which captures the behaviour of programs with respect to shared data into the framework of process algebra. The core theory can describe prog...
Simon A. Dobson, Christopher P. Wadsworth