Fault-tolerance techniques based on checkpointing and message logging have been increasingly used in real-world applications to reduce service down-time. Most industrial applicati...
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Jobs submitted into a cluster have varying requirements depending on user-specific needs and expectations. Therefore, in utility-driven cluster computing, cluster Resource Manage...
The advent of Cloud computing platforms, and the growing pervasiveness of Multicore processor architectures have revealed the inadequateness of traditional programming models base...
Online travel support systems have often been cited as an ideal proving ground for agent-based architectures, yet no working systems have materialized. Over the last few years we ...