Sciweavers

1087 search results - page 150 / 218
» Achieving Distributed Control through Model Checking
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 9 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
ICDCS
2009
IEEE
14 years 6 months ago
QVS: Quality-Aware Voice Streaming for Wireless Sensor Networks
Recent years have witnessed the pilot deployments of audio or low-rate video wireless sensor networks for a class of mission-critical applications including search and rescue, sec...
Liqun Li, Guoliang Xin, Limin Sun, Yan Liu
SASO
2009
IEEE
14 years 4 months ago
Swarming Polyagents Executing Hierarchical Task Networks
Swarming agents often operate in benign geographic topologies that let them explore alternative trajectories with minor variations that the agent dynamics then amplify for improve...
Sven A. Brueckner, Theodore C. Belding, Robert Bis...
ICSE
2007
IEEE-ACM
14 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ICDCS
2009
IEEE
14 years 4 months ago
Towards Optimal Resource Utilization in Heterogeneous P2P Streaming
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by endusers, little has been known about the upper bounds of achievable performanc...
Dongyu Liu, Fei Li, Songqing Chen