Sciweavers

186 search results - page 31 / 38
» Choreographies: using Constraints to Satisfy Service Request...
Sort
View
MOBICOM
1996
ACM
13 years 11 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
INFOCOM
2010
IEEE
13 years 6 months ago
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback
—We venture beyond the “listen-before-talk” strategy that is common in many traditional cognitive radio access schemes. We exploit the bi-directional nature of most primary c...
Senhua Huang, Xin Liu, Zhi Ding
AAMAS
2002
Springer
13 years 7 months ago
Larks: Dynamic Matchmaking Among Heterogeneous Software Agents in Cyberspace
Service matchmaking among heterogeneous software agents in the Internet is usually done dynamically and must be efficient. There is an obvious trade-off between the quality and eff...
Katia P. Sycara, Seth Widoff, Matthias Klusch, Jia...
SAC
2004
ACM
14 years 1 months ago
A comparison of randomized and evolutionary approaches for optimizing base station site selection
It is increasingly important to optimally select base stations in the design of cellular networks, as customers demand cheaper and better wireless services. From a set of potentia...
Larry Raisanen, Roger M. Whitaker, Steve Hurley
EMSOFT
2005
Springer
14 years 1 months ago
Real-time interfaces for interface-based design of real-time systems with fixed priority scheduling
The central idea behind interface-based design is to describe components by a component interface. In contrast to a component description that describes what a component does, a c...
Ernesto Wandeler, Lothar Thiele