Sciweavers

2609 search results - page 391 / 522
» Models for Global Constraint Applications
Sort
View
130
Voted
CIKM
2001
Springer
15 years 8 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
140
Voted
FORTE
2000
15 years 5 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
ATAL
2010
Springer
15 years 5 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
FGCS
2007
107views more  FGCS 2007»
15 years 3 months ago
Design and analysis of a load balancing strategy in Data Grids
Developing Data Grids has increasingly become a major concern to make Grids attractive for a wide range of data-intensive applications. Storage subsystems are most likely to be a ...
Xiao Qin
COMCOM
2004
117views more  COMCOM 2004»
15 years 3 months ago
The case for interdomain dynamic QoS-based service negotiation in the internet
The evolution of the Internet towards a global infrastructure for real time voice and video applications involves providing stringent Quality of Service (QoS) levels. Although som...
Carlos Alberto Kamienski, Djamel Sadok