Sciweavers

9325 search results - page 80 / 1865
» The decentralized implementability problem
Sort
View
POPL
1999
ACM
15 years 2 months ago
JFlow: Practical Mostly-Static Information Flow Control
A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work...
Andrew C. Myers
ATAL
2008
Springer
14 years 12 months ago
Sensing-based shape formation on modular multi-robot systems: a theoretical study
This paper presents a theoretical study of decentralized control for sensing-based shape formation on modular multirobot systems, where the desired shape is specified in terms of ...
Chih-Han Yu, Radhika Nagpal
INFOCOM
2008
IEEE
15 years 4 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
POLICY
2005
Springer
15 years 3 months ago
An Audit Logic for Accountability
We describe a policy language and implement its associated proof checking system. In our system, agents can distribute data along with usage policies in a decentralized architectu...
J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, ...
GECCO
2004
Springer
211views Optimization» more  GECCO 2004»
15 years 3 months ago
Adaptive and Evolvable Network Services
This paper proposes an evolutionary framework where a network service is created from a group of autonomous agents that interact and evolve. Agents in our framework are capable of ...
Tadashi Nakano, Tatsuya Suda