Sciweavers

1490 search results - page 259 / 298
» The Logic of Authentication Protocols
Sort
View
ATAL
2009
Springer
14 years 3 months ago
Combining fault injection and model checking to verify fault tolerance in multi-agent systems
The ability to guarantee that a system will continue to operate correctly under degraded conditions is key to the success of adopting multi-agent systems (MAS) as a paradigm for d...
Jonathan Ezekiel, Alessio Lomuscio
IPSN
2010
Springer
14 years 3 months ago
Covering space for in-network sensor data storage
For in-network storage schemes, one maps data, indexed in a logical space, to the distributed sensor locations. When the physical sensor network has an irregular shape and possibl...
Rik Sarkar, Wei Zeng, Jie Gao, Xianfeng David Gu
ICDCS
2008
IEEE
14 years 3 months ago
A Nonblocking Approach for Reaching an Agreement on Request Total Orders
In distributed systems that use active replication to achieve robustness, it is important to efficiently enforce consistency among replicas. The nonblocking mode helps to speed u...
Yun Wang, Jie Wu
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 3 months ago
OntoNet: Scalable knowledge-based networking
Recent years have seen a proliferation of work on the Semantic Web, an initiative to enable intelligent agents to reason about and utilize World Wide Web content and services. Con...
Joseph B. Kopena, Boon Thau Loo
ADHOCNOW
2008
Springer
14 years 3 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli