Sciweavers

1490 search results - page 260 / 298
» The Logic of Authentication Protocols
Sort
View
ICPP
2007
IEEE
14 years 3 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...
AOSE
2007
Springer
14 years 3 months ago
Developing a Multiagent Conference Management System Using the O-MaSE Process Framework
This paper describes how the Organization-based Multiagent Systems Engineering (O-MaSE) methodology can be applied to an exemplar multiagent system, the Conference Management Syste...
Scott A. DeLoach
PRIMA
2007
Springer
14 years 2 months ago
An Agent Modeling Method Based on Scenario Rehearsal for Multiagent Simulation
Multiagent Systems are potential computational systems for various practical applications, tools, and so on. Multiagent simulation is one of the remarkable application to evaluate ...
Shohei Yamane, Toru Ishida
E4MAS
2004
Springer
14 years 2 months ago
Supporting Context-Aware Interaction in Dynamic Multi-agent Systems
The increasing ubiquity of mobile computing devices has made mobile ad hoc networks an everyday occurrence. Applications in these networks are commonly structured as a logical netw...
Christine Julien, Gruia-Catalin Roman
ITC
2003
IEEE
176views Hardware» more  ITC 2003»
14 years 2 months ago
Instruction Based BIST for Board/System Level Test of External Memories and Internconnects
ct This paper describes a general technique to test external memory/caches and memory interconnects using on-chip logic. Such a test methodology is expected to significantly reduc...
Olivier Caty, Ismet Bayraktaroglu, Amitava Majumda...