Sciweavers

1537 search results - page 212 / 308
» Deployment of Distributed Multi-agent Systems
Sort
View
SIROCCO
2010
13 years 11 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
TC
1998
13 years 9 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
COMPSAC
2010
IEEE
13 years 8 months ago
An Adaptation Approach for Component-Based Software Architecture
In this paper we propose a meta-model for architectures with heterogeneous multimedia components. Currently, a generic solution does not exist to automatically deploy a distributed...
Derdour Makhlouf, Philippe Roose, Marc Dalmau, Nac...
P2P
2010
IEEE
167views Communications» more  P2P 2010»
13 years 8 months ago
Boosting Gossip for Live Streaming
Gossip protocols are considered very effective to disseminate information in a large scale dynamic distributed system. Their inherent simplicity makes them easy to implement and de...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
EUROSYS
2009
ACM
14 years 7 months ago
Predicting replicated database scalability from standalone database profiling
This paper develops analytical models to predict the throughput and the response time of a replicated database using measurements of the workload on a standalone database. These m...
Sameh Elnikety, Steven G. Dropsho, Emmanuel Cecche...