Sciweavers

199 search results - page 22 / 40
» Developing a security protocol for a distributed decision su...
Sort
View
WSC
1997
13 years 9 months ago
Using Compensating Reconfiguration to Maintain Military Distributed Simulations
In Department of Defense (DoD) distributed training simulations, events occur that can cause unrealistic behavior. These events can be system events, such as the loss of a hostor ...
Donald J. Welch, James M. Purtilo
ECOOP
2008
Springer
13 years 9 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
SAC
2005
ACM
14 years 1 months ago
Dynamic group communication in mobile peer-to-peer environments
This paper presents an approach to integrate publish/subscribe semantics with on-demand multicast in wireless ad hoc networks, providing dynamic group communication with fine-gra...
Eiko Yoneki, Jean Bacon
PERCOM
2004
ACM
14 years 7 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
NDSS
2007
IEEE
14 years 1 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...