Sciweavers

588 search results - page 54 / 118
» Rendezvous without coordinates
Sort
View
NDSS
2000
IEEE
15 years 4 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
ACSAC
1999
IEEE
15 years 4 months ago
Security Architecture Development and Results for a Distributed Modeling and Simulation System
This paper reports on an ongoing effort to define the security architecture for the Joint Simulation System (JSIMS), a joint military modeling and simulation system. It also descr...
Richard B. Neely
IATA
1999
Springer
15 years 4 months ago
Market-Based Call Routing in Telecommunications Networks Using Adaptive Pricing and Real Bidding
We present a market-based approach to call routing in telecommunications networks. A system architecture is described that allows self-interested agents, representing various netwo...
M. A. Gibney, Nicholas R. Jennings, N. J. Vriend, ...
PVM
1999
Springer
15 years 4 months ago
Building MPI for Multi-Programming Systems Using Implicit Information
Abstract. With the growing importance of fast system area networks in the parallel community, it is becoming common for message passing programs to run in multi-programming environ...
Frederick C. Wong, Andrea C. Arpaci-Dusseau, David...
IATA
1998
Springer
15 years 4 months ago
Dynamic Resource Allocation by Market-Based Routing in Telecommunications Networks
We present an approach to resource allocation in telecommunications networks based on the interaction of self-interested agents which have limited information about their environme...
M. A. Gibney, Nicholas R. Jennings