Sciweavers

1592 search results - page 223 / 319
» The state of the email address
Sort
View
AGENTS
2000
Springer
15 years 5 months ago
Agent communication transfer protocol
Conversations involving three or more agents often occur in multi-agent systems, for example in brokering and auction protocols typically used in e-commerce. For developing agents ...
Alexander Artikis, Jeremy Pitt, Christos Stergiou
120
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
DSRT
1999
IEEE
15 years 5 months ago
Reliable Multicast Network Transport for Distributed Virtual Simulation
: This paper addresses the need for reliable multicast (RM) network support for the class of distributed virtual simulations (DVS) that operate with human participants who experien...
J. Mark Pullen
AC
1999
Springer
15 years 5 months ago
Enhancing Replica Management Services to Cope with Group Failures
In a distributed system, replication of components, such as objects, is a well known way of achieving availability. For increased availability, crashed and disconnected components...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
IPPS
1999
IEEE
15 years 5 months ago
A Network Status Predictor to Support Dynamic Scheduling in Network-Based Computing Systems
The management of networks has often been ignored in network-based computing systems due to the difficulty of estimating application programs' network latency and bandwidth r...
JunSeong Kim, David J. Lilja