Sciweavers

4998 search results - page 82 / 1000
» The case for intentional networking
Sort
View
LCN
2006
IEEE
14 years 2 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
AUSAI
2004
Springer
14 years 2 months ago
A Comparison of BDI Based Real-Time Reasoning and HTN Based Planning
The Belief-Desire-Intention (BDI) model of agency is an architecture based on Bratman’s theory of practical reasoning. Hierarchical Task Network (HTN) decomposition on the other ...
Lavindra de Silva, Lin Padgham
HCW
1998
IEEE
14 years 1 months ago
Modular Heterogeneous System Development: A Critical Analysis of Java
Java supports heterogeneous applications by transforming a heterogeneous network of machines into a homogeneous network of Java virtual machines. This abstracts over many of the c...
Gul Agha, Mark Astley, Jamil A. Sheikh, Carlos A. ...
DSN
2007
IEEE
14 years 22 days ago
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes
Increasing interest is being paid to quantitative evaluation based on measurements of dependability attributes and metrics of computer systems and infrastructures. Despite measura...
Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Fala...
SOCO
2011
Springer
13 years 3 months ago
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms...
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof S...