Sciweavers

160 search results - page 26 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
INDOCRYPT
2001
Springer
14 years 27 days ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
IWAI
1999
Springer
14 years 21 days ago
Redesigning the Agents' Decision Machinery
In a multi-agent system, agents must decide what to do and by what order. Autonomy is a key notion in such a system, since it is mainly the autonomy of the agents that makes the en...
Luis Antunes, Helder Coelho
RTSS
2005
IEEE
14 years 2 months ago
Enhancing the Robustness of Distributed Real-Time Middleware via End-to-End Utilization Control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Chenyang Lu, Xenofon D. Koutsoukos
GRID
2004
Springer
14 years 1 months ago
Self-Organizing Agents for Grid Load Balancing
A computational grid is a wide-area computing environment for cross-domain resource sharing and service integration. Resource management and load balancing are key concerns when i...
Junwei Cao
JSS
2007
99views more  JSS 2007»
13 years 8 months ago
FC-ORB: A robust distributed real-time embedded middleware with end-to-end utilization control
A key challenge for distributed real-time and embedded (DRE) middleware is maintaining both system reliability and desired real-time performance in unpredictable environments wher...
Xiaorui Wang, Yingming Chen, Chenyang Lu, Xenofon ...