Sciweavers

5665 search results - page 50 / 1133
» Introduction to Computer Security
Sort
View
PDCAT
2007
Springer
14 years 2 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
ACSAC
1999
IEEE
14 years 1 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
IPPS
2008
IEEE
14 years 3 months ago
Resource allocation in a client/server hybrid network for virtual world environments
The creation of a virtual world environment (VWE) has significant costs, such as maintenance of server rooms, server administration, and customer service. The initial development...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
LION
2007
Springer
113views Optimization» more  LION 2007»
14 years 3 months ago
Limited-Memory Techniques for Sensor Placement in Water Distribution Networks
Abstract. The practical utility of optimization technologies is often impacted by factors that reflect how these tools are used in practice, including whether various real-world c...
William E. Hart, Jonathan W. Berry, Erik G. Boman,...
PACT
2001
Springer
14 years 1 months ago
UNICORE: A Grid Computing Environment for Distributed and Parallel Computing
UNICORE (UNiform Interface to COmputer REsources) provides a seamless and secure access to distributed supercomputer resources. This paper will give an overview of the its architec...
Valentina Huber