Sciweavers

1777 search results - page 297 / 356
» Programming Cryptographic Protocols
Sort
View
NETGAMES
2004
ACM
14 years 2 months ago
Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games
Today’s Multi-player Online Games (MOGs) are challenged by infrastructure requirements, because of their server-centric nature. Peer-to-peer networks are an interesting alternat...
Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
CD
2004
Springer
14 years 2 months ago
Dynamic Deployment of IIOP-Enabled Components in the JBoss Server
Abstract. JBoss is an extensible Java application server that affords remote access to EJB components via multiple protocols. Its IIOP module supports IIOP-enabled EJBs, which are...
Francisco Reverbel, Bill Burke, Marc Fleury
COORDINATION
2004
Springer
14 years 2 months ago
Optimistic Concurrency Semantics for Transactions in Coordination Languages
There has been significant recent interest in exploring the role of coordination languages as middleware for distributed systems. These languages provide operations that allow pro...
Suresh Jagannathan, Jan Vitek
ECAI
2004
Springer
14 years 2 months ago
Combining Multiple Answers for Learning Mathematical Structures from Visual Observation
Learning general truths from the observation of simple domains and, further, learning how to use this knowledge are essential capabilities for any intelligent agent to understand ...
Paulo Santos, Derek R. Magee, Anthony G. Cohn, Dav...
INFOCOM
2003
IEEE
14 years 2 months ago
Modeling Malware Spreading Dynamics
— In this paper we present analytical techniques that can be used to better understand the behavior of malware, a generic term that refers to all kinds of malicious software prog...
Michele Garetto, Weibo Gong, Donald F. Towsley