Sciweavers

483 search results - page 76 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
DAWAK
2001
Springer
15 years 8 months ago
Matchmaking for Structured Objects
A fundamental task in multi-agent systems is matchmaking, which is to retrieve and classify service descriptions of agents that (best) match a given service request. Several approa...
Thomas Eiter, Daniel Veit, Jörg P. Mülle...
168
Voted
SACMAT
2009
ACM
15 years 10 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
STORAGESS
2006
ACM
15 years 9 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
145
Voted
ICAC
2008
IEEE
15 years 10 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
161
Voted
IDMS
2000
Springer
131views Multimedia» more  IDMS 2000»
15 years 7 months ago
Spatially Aware Local Communication in the RAUM System
In this paper, we propose a new paradigm for local communication between devices in Ubiquitous Computing environments, assuming a multitude of computerized everyday appliances comm...
Felix Hupfeld, Michael Beigl