Sciweavers

5220 search results - page 162 / 1044
» Changing Persistent Applications
Sort
View
WMCSA
2003
IEEE
15 years 10 months ago
A Historic Name-Trail Service
1 In this work we consider the mobility of personal online identifiers. People change the identifiers through which they are reachable on-line as they change jobs or residences ...
Petros Maniatis, Mary Baker
ATAL
2006
Springer
15 years 8 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau
AAAI
2006
15 years 6 months ago
Maintaining Cooperation in Noisy Environments
To prevent or alleviate conflicts in multi-agent environments, it is important to distinguish between situations where another agent has misbehaved intentionally and situations wh...
Tsz-Chiu Au, Dana S. Nau
USENIX
2004
15 years 6 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
DEBS
2008
ACM
15 years 5 months ago
An adaptive approach for ensuring reliability in event based middleware
In this effort we tackle the important issue of providing Quality of Service (QoS) guarantees to subscribers, when routing event notifications in a publish-subscribe domain. In ...
Shruti P. Mahambre, Umesh Bellur