Sciweavers

1537 search results - page 100 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
CONEXT
2008
ACM
13 years 11 months ago
Distributed content delivery using load-aware network coordinates
To scale to millions of Internet users with good performance, content delivery networks (CDNs) must balance requests between content servers while assigning clients to nearby serv...
Nicholas Ball, Peter R. Pietzuch
FOIS
2010
13 years 11 months ago
Ontologies for Distributed Command and Control Messaging
This paper presents the development of a set of ontologies for use in messaging systems within military and emergency first responder command and control applications. These ontolo...
Duc N. Nguyen, Joseph B. Kopena, Boon Thau Loo, Wi...
IPPS
2007
IEEE
14 years 4 months ago
Packet Loss Burstiness: Measurements and Implications for Distributed Applications
Many modern massively distributed systems deploy thousands of nodes to cooperate on a computation task. Network congestions occur in these systems. Most applications rely on conge...
David X. Wei, Pei Cao, Steven H. Low
HPDC
1998
IEEE
14 years 1 months ago
Matchmaking: Distributed Resource Management for High Throughput Computing
Conventional resource management systems use a system model to describe resources and a centralized scheduler to control their allocation. We argue that this paradigm does not ada...
Rajesh Raman, Miron Livny, Marvin H. Solomon