Sciweavers

2517 search results - page 480 / 504
» Specifying Weak Sets
Sort
View
CCS
2001
ACM
13 years 12 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
CEEMAS
2001
Springer
13 years 12 months ago
UML for Behavior-Oriented Multi-agent Simulations
Developing multi-agent simulations seems to be rather straight forward, as active entities in the original correspond to active agents in the model. Thus plausible behaviors can be...
Christoph Oechslein, Franziska Klügl, Rainer ...
NOMS
2000
IEEE
125views Communications» more  NOMS 2000»
13 years 11 months ago
A distributed resource controller for QoS applications
The Distributed Resource Controller (DRC) technology described in this paper provides a novel approach to interfacing applications with emerging network mechanisms to deliver Qual...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
RTCSA
2000
IEEE
13 years 11 months ago
Frame packing in real-time communication
A common computational model in distributed embedded systems is that the nodes exchange signals via a network. Most often a signal represents the state of some physical device and...
Kristian Sandström, Christer Norström, M...
ATAL
2000
Springer
13 years 11 months ago
Task Coordination Paradigms for Information Agents
In agent systems, different (autonomous) agents collaborate to execute complex tasks. Each agent provides a set of useful capabilities, and the agent system combines these capabili...
Marian H. Nodine, Damith Chandrasekara, Amy Unruh