Sciweavers

960 search results - page 103 / 192
» The disaster of central control
Sort
View
IPPS
2003
IEEE
15 years 5 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
SAINT
2003
IEEE
15 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
DIGRA
2003
Springer
15 years 5 months ago
Stepping Back: Players as Active Participators
Instead of confining the player to a single role, the active participator model positions the player in a more flexible position towards the fictional gameworld: involved and imme...
Michael Nitsche, Maureen Thomas
ESAW
2003
Springer
15 years 5 months ago
Using Swarm Intelligence in Linda Systems
Abstract. Natural forming multi-agent systems have the ability to grow to enormous sizes and perform seemingly complex tasks without the existence of any centralized control. Their...
Robert Tolksdorf, Ronaldo Menezes
CCGRID
2002
IEEE
15 years 4 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran