Sciweavers

2664 search results - page 470 / 533
» The Many Faces of Agents
Sort
View
CCGRID
2006
IEEE
15 years 6 months ago
Large Scale Distributed Simulation on the Grid
The development of many complex simulation applications requires collaborative effort from researchers with different domain knowledge and expertise, possibly at different locatio...
Georgios K. Theodoropoulos, Yi Zhang, Dan Chen, Ro...
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 5 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
PLDI
2006
ACM
15 years 5 months ago
Continuations and transducer composition
On-line transducers are an important class of computational agent; we construct and compose together many software systems using them, such as stream processors, layered network p...
Olin Shivers, Matthew Might
SC
2005
ACM
15 years 5 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
57
Voted
ATAL
2005
Springer
15 years 5 months ago
How local is that optimum? k-optimality for DCOP
In multi-agent systems where sets of joint actions (JAs) are generated, metrics are needed to evaluate these sets and efficiently allocate resources for the many JAs. For the case...
Jonathan P. Pearce, Rajiv T. Maheswaran, Milind Ta...