Sciweavers

1123 search results - page 156 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICPADS
2005
IEEE
15 years 10 months ago
Efficient Barrier Synchronization on Wireless Computing Systems
This work deals with efficient barrier synchronization for wireless cluster computing where nodes communicate with each other wirelessly in one or multiple hops. Such a computing ...
Nian-Feng Tzeng, Bhanurekha Kasula, Hongyi Wu
IJCAI
2007
15 years 5 months ago
Communicating Effectively in Resource-Constrained Multi-Agent Systems
Agents with partial observability need to share information to achieve decentralised coordination. However, in resource-constrained systems, indiscriminate communication can creat...
Partha Sarathi Dutta, Claudia V. Goldman, Nicholas...
ICNP
2003
IEEE
15 years 9 months ago
Matchmaker: Signaling for Dynamic Publish/Subscribe Applications
The publish/subscribe (pub/sub) paradigm provides content-oriented data dissemination in which communication channels are established between content publishers and content subscr...
Zihui Ge, Ping Ji, James F. Kurose, Donald F. Tows...
BMCBI
2010
259views more  BMCBI 2010»
14 years 11 months ago
Rule-based spatial modeling with diffusing, geometrically constrained molecules
Background: We suggest a new type of modeling approach for the coarse grained, particle-based spatial simulation of combinatorially complex chemical reaction systems. In our appro...
Gerd Gruenert, Bashar Ibrahim, Thorsten Lenser, Ma...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...