Sciweavers

347 search results - page 55 / 70
» Proactive Computing
Sort
View
AOSE
2001
Springer
14 years 2 months ago
Agent-Oriented Modelling: Software versus the World
Agent orientation is currently pursued primarily as a software paradigm. Software with characteristics such as autonomy, sociality, reactivity and proactivity, and communicative an...
Eric S. K. Yu
IPCCC
1999
IEEE
14 years 2 months ago
Management policies for non-volatile write caches
Many computer hardware and software architectures buffer data in memory to improve system performance. Volatile disk or file caches are sometimes used to delay the propagation of ...
Theodore R. Haining, Darrell D. E. Long
EUROCRYPT
1999
Springer
14 years 2 months ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
MASCOTS
2000
13 years 11 months ago
A Transaction-Level Tool for Predicting TCP Performance and for Network Engineering
Most network engineering tools are unsatisfactory. Measurements are not predictive, simulations do not scale, and analysis is limited to oversimplified models. To be more useful, ...
Jean C. Walrand
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 10 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller