Sciweavers

2154 search results - page 404 / 431
» Architectures for Negotiating Agents
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ISPA
2004
Springer
14 years 3 months ago
A Peer-to-Peer Mechanism for Resource Location and Allocation Over the Grid
Abstract. Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resourc...
Hung-Chang Hsiao, Mark Baker, Chung-Ta King
COOPIS
2003
IEEE
14 years 2 months ago
DLS: A CORBA Service for Dynamic Loading of Code
Dynamic loading of code is needed when rarely used code should be loaded on demand or when the code to be loaded is not known in advance. In distributed systems it can also be used...
Rüdiger Kapitza, Franz J. Hauck
WETICE
2002
IEEE
14 years 2 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
AIWORC
2000
IEEE
14 years 2 months ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...