The high cost of operating large computing installations has motivated a broad interest in reducing the need for human intervention by making systems self-managing. This paper exp...
Yixin Diao, Joseph L. Hellerstein, Sujay S. Parekh...
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
This article presents the results of experiments performed with agents based on an operalization of an information-theoretic model for trust. Experiments have been performed with t...