Sciweavers

270 search results - page 47 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
ATAL
2005
Springer
14 years 2 months ago
Reciprocal resource sharing in P2P environments
Peer-to-peer (P2P) systems enable users to share resources in a networked environment without worrying about issues such as scalability and load balancing. Unlike exchange of good...
Dipyaman Banerjee, Sabyasachi Saha, Sandip Sen, Pr...
ECOOPW
1999
Springer
14 years 29 days ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
SASN
2005
ACM
14 years 2 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
MIDDLEWARE
2005
Springer
14 years 2 months ago
Network Processing of Documents, for Documents, by Documents
This paper presents a content-dependent and configurable framework for the network processing of documents. Like existing compound document frameworks, it enables an enriched docu...
Ichiro Satoh
KES
2006
Springer
13 years 8 months ago
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
Abstract. This paper presents a new multi-agent physics-based simulation framework (DISCOVERY), supporting experiments with self-organizing underwater sensor and actuator networks....
Vadim Gerasimov, Gerry Healy, Mikhail Prokopenko, ...