Soft-device is a promising infrastructure of next-generation distributed system. Soft-devices are configurable and adaptive software virtual mechanism, providing services to each o...
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
: Structuring real-time concurrent programs in the form of groups of fixed-priority processes is an old art which is appropriate for only a small fraction of modern real-time distr...
In this paper we use game theory to study nodes’ behavior in peer-to-peer networks when nodes receive service based on their reputation. Reputation is used as a mechanism to inc...
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...