Sciweavers

2645 search results - page 109 / 529
» Autonomous security for autonomous systems
Sort
View
135
Voted
AINA
2007
IEEE
15 years 10 months ago
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
138
Voted
OSDI
2002
ACM
16 years 4 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
NSDI
2008
15 years 6 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
125
Voted
ICSE
2005
IEEE-ACM
16 years 4 months ago
Research challenges of autonomic computing
Autonomic computing is a grand-challenge vision of the future in which computing systems will manage themselves in accordance with high-level objectives specified by humans. The I...
Jeffrey O. Kephart
ATAL
2004
Springer
15 years 9 months ago
Merging Globally Rigid Formations of Mobile Autonomous Agents
This paper is concerned with merging globally rigid formations of mobile autonomous agents. A key element in all future multi-agent systems will be the role of sensor and communic...
Tolga Eren, Brian D. O. Anderson, Walter Whiteley,...