Sciweavers

2645 search results - page 406 / 529
» Autonomous security for autonomous systems
Sort
View
JWSR
2007
104views more  JWSR 2007»
15 years 4 months ago
Dealing with Scale and Adaptation of Global Web Services Management
Service Oriented Architectures (SOA) are becoming the prevalent approach for realizing modern services and systems. SOA offers superior support for autonomy (decoupling) and heter...
William Vambenepe, Carol Thompson, Vanish Talwar, ...
TKDE
2010
164views more  TKDE 2010»
15 years 2 months ago
Defeasible Contextual Reasoning with Arguments in Ambient Intelligence
Abstract—The imperfect nature of context in Ambient Intelligence environments and the special characteristics of the entities that possess and share the available context informa...
Antonis Bikakis, Grigoris Antoniou
WIOPT
2010
IEEE
15 years 2 months ago
Low complexity algorithms for relay selection and power control in interference-limited environments
Abstract—We consider an interference-limited wireless network, where multiple source-destination pairs compete for the same pool of relay nodes. In an attempt to maximize the sum...
Lazaros Gkatzikis, Iordanis Koutsopoulos
EMSOFT
2010
Springer
15 years 2 months ago
A unifying view of loosely time-triggered architectures
Abstract--Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz' Time-Triggered Architectures (TTA) have been proposed ...
Albert Benveniste, Anne Bouillard, Paul Caspi
148
Voted
WD
2010
15 years 2 months ago
Self-organized aggregation in irregular wireless networks
Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor kno...
Joanna Geibig, Dirk Bradler