Sciweavers

6907 search results - page 112 / 1382
» Securing distributed adaptation
Sort
View
ATAL
2003
Springer
15 years 3 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh
ICEIS
1999
IEEE
15 years 2 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos
RTAS
1996
IEEE
15 years 2 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
OSDI
2000
ACM
14 years 11 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
JCM
2008
74views more  JCM 2008»
14 years 10 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...