Sciweavers

2634 search results - page 507 / 527
» Infrastructured Ad Hoc Networks
Sort
View
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
HPDC
1997
IEEE
14 years 1 months ago
A Directory Service for Configuring High-Performance Distributed Computations
High-performance execution in distributed computing environments often requires careful selection and configuration not only of computers, networks, and other resources but also o...
Steven Fitzgerald, Ian T. Foster, Carl Kesselman, ...
ESWS
2010
Springer
13 years 11 months ago
OKBook: Peer-to-Peer Community Formation
Many systems exist for community formation in extensions of traditional Web environments but little work has been done for forming and maintaining communities in the more dynamic e...
Xi Bai, Wamberto Vasconcelos, Dave Robertson
AAMAS
2007
Springer
13 years 10 months ago
A formal framework for connective stability of highly decentralized cooperative negotiations
Abstract. Multiagent cooperative negotiation is a promising technique for modeling and controlling complex systems. Effective and flexible cooperative negotiations are especially...
Francesco Amigoni, Nicola Gatti
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 10 months ago
Opportunistic Collaborative Beamforming with One-Bit Feedback
An energy-efficient opportunistic collaborative beamformer with one-bit feedback is proposed for ad hoc sensor networks over Rayleigh fading channels. In contrast to conventional c...
Man-On Pun, D. Richard Brown III, H. Vincent Poor