Sciweavers

1950 search results - page 328 / 390
» Two Abstractions for Distributed Systems of Mobile Nodes
Sort
View
PIMRC
2010
IEEE
15 years 2 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
EDOC
2007
IEEE
15 years 11 months ago
On Interoperability and Conformance Assessment in Service Composition
The process of composing a service from other services typically involves multiple models. These models may represent the service from distinct perspectives, e.g., to model the di...
Dick A. C. Quartel, Marten van Sinderen
EUROPAR
2006
Springer
15 years 8 months ago
Early Experiences with KTAU on the IBM BG/L
Abstract. The influences of OS and system-specific effects on application performance are increasingly important in high performance computing. In this regard, OS kernel measuremen...
Aroon Nataraj, Allen D. Malony, Alan Morris, Samee...
TROB
2002
75views more  TROB 2002»
15 years 4 months ago
Sold!: auction methods for multirobot coordination
Abstract--The key to utilizing the potential of multirobot systems is cooperation. How can we achieve cooperation in systems composed of failure-prone autonomous robots operating i...
Brian P. Gerkey, Maja J. Mataric
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 10 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...