Sciweavers

3967 search results - page 622 / 794
» Distributed Games and Distributed Control for Asynchronous S...
Sort
View
123
Voted
HIPEAC
2005
Springer
15 years 8 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi
143
Voted
UPP
2004
Springer
15 years 8 months ago
Programming an Amorphous Computational Medium
Amorphous computing considers the problem of controlling millions of spatially distributed unreliable devices which communicate only with nearby neighbors. To program such a system...
Jacob Beal
123
Voted
HOTOS
2003
IEEE
15 years 8 months ago
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to ...
Charles Blake, Rodrigo Rodrigues
99
Voted
ATAL
2009
Springer
15 years 7 months ago
Virtual institutions prototype
Virtual Institutions are Virtual Worlds with normative regulation of participants’ interactions. This paradigm is based on normative multiagent systems and is technologically su...
Anton Bogdanovych, Simeon J. Simoff, Marc Esteva
112
Voted
DATE
2000
IEEE
121views Hardware» more  DATE 2000»
15 years 7 months ago
Composite Signal Flow: A Computational Model Combining Events, Sampled Streams, and Vectors
The composite signal flow model of computation targets systems with significant control and data processing parts. It builds on the data flow and synchronous data flow models ...
Axel Jantsch, Per Bjuréus