Sciweavers

1537 search results - page 212 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
SIROCCO
2010
15 years 3 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
TC
1998
15 years 2 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
COMPSAC
2010
IEEE
15 years 14 days ago
An Adaptation Approach for Component-Based Software Architecture
In this paper we propose a meta-model for architectures with heterogeneous multimedia components. Currently, a generic solution does not exist to automatically deploy a distributed...
Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nac...
P2P
2010
IEEE
167views Communications» more  P2P 2010»
15 years 10 days ago
Boosting Gossip for Live Streaming
Gossip protocols are considered very effective to disseminate information in a large scale dynamic distributed system. Their inherent simplicity makes them easy to implement and de...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
EUROSYS
2009
ACM
15 years 11 months ago
Predicting replicated database scalability from standalone database profiling
This paper develops analytical models to predict the throughput and the response time of a replicated database using measurements of the workload on a standalone database. These m...
Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecche...