Sciweavers

2131 search results - page 377 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
14 years 2 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai
ICSOC
2003
Springer
14 years 2 months ago
Service-Based Distributed Querying on the Grid
Service-based approaches (such as Web Services and the Open Grid Services Architecture) have gained considerable attention recently for supporting distributed application developme...
M. Nedim Alpdemir, Arijit Mukherjee, Norman W. Pat...
SIGCOMM
1991
ACM
14 years 17 days ago
A Control-Theoretic Approach to Flow Control
This paper presents a control-theoretic approach to reactive flow control in networks that do not reserve bandwidth. We assume a round-robin-like queue service discipline in the o...
Srinivasan Keshav
TIFS
2008
142views more  TIFS 2008»
13 years 9 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
TSE
2002
99views more  TSE 2002»
13 years 8 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...