Sciweavers

1748 search results - page 50 / 350
» Security Models for Heterogeneous Networking
Sort
View
AGENTS
1998
Springer
15 years 7 months ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus
KDD
2009
ACM
198views Data Mining» more  KDD 2009»
16 years 3 months ago
Heterogeneous source consensus learning via decision propagation and negotiation
Nowadays, enormous amounts of data are continuously generated not only in massive scale, but also from different, sometimes conflicting, views. Therefore, it is important to conso...
Jing Gao, Wei Fan, Yizhou Sun, Jiawei Han
OOPSLA
2010
Springer
15 years 1 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
WORM
2004
15 years 4 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...
HPCNCS
2007
15 years 4 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...