Sciweavers

202 search results - page 33 / 41
» Location management in object-based distributed computing
Sort
View
120
Voted
SACMAT
2009
ACM
15 years 9 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
93
Voted
ATAL
2007
Springer
15 years 8 months ago
WS-agreement based resource negotiation in AgentScape
Mobile agents require access to computing resources on heterogeneous systems across the Internet. This demo illustrates how agents can negotiate terms and conditions of resource a...
Michel A. Oey, Reinier J. Timmer, David G. A. Moba...
128
Voted
INFOCOM
2002
IEEE
15 years 7 months ago
TCP Network Calculus: The case of large delay-bandwidth product
Abstract— We present in this paper an analytical model for the calculation of network load and drop probabilities in a TCP/IP network with general topology. First we formulate ou...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
KDD
2001
ACM
142views Data Mining» more  KDD 2001»
16 years 3 months ago
TreeDT: gene mapping by tree disequilibrium test
We introduce and evaluate TreeDT, a novel gene mapping method which is based on discovering and assessing tree-like patterns in genetic marker data. Gene mapping aims at discoveri...
Petteri Sevon, Hannu Toivonen, Vesa Ollikainen
141
Voted
SC
2000
ACM
15 years 7 months ago
Dynamic Software Testing of MPI Applications with Umpire
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for managing coarse-grained concurrency on distributed com...
Jeffrey S. Vetter, Bronis R. de Supinski