Sciweavers

9588 search results - page 1593 / 1918
» Service Value Networks
Sort
View
EUROMICRO
2004
IEEE
15 years 8 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
134
Voted
FUZZY
2004
Springer
134views Fuzzy Logic» more  FUZZY 2004»
15 years 8 months ago
Ubiquitous Robot
- The UPnP(Universal Plug and Play) architecture offers pervasive peer-to-peer network connectivity of intelligent appliances in dynamic distributed computing environment. This pap...
Jong-Hwan Kim
EUROSSC
2006
Springer
15 years 8 months ago
Toward Wide Area Interaction with Ubiquitous Computing Environments
Despite many years of ubiquitous computing (ubicomp) middleware research, deployment of such systems has not been widespread. We suggest this is in part because we lack a shared mo...
Michael Blackstock, Rodger Lea, Charles Krasic
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 8 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
AGENTS
2001
Springer
15 years 8 months ago
Configuration management for multi-agent systems
As heterogeneous distributed systems, multi-agent systems present some challenging con guration management issues. There are the problems of knowing how to allocate agents to comp...
Joseph A. Giampapa, Octavio H. Juarez-Espinosa, Ka...
« Prev « First page 1593 / 1918 Last » Next »