Sciweavers

3319 search results - page 616 / 664
» The topology of dark networks
Sort
View
TPHOL
2009
IEEE
14 years 5 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
COCOA
2009
Springer
14 years 5 months ago
Recoverable Robust Timetables on Trees
In the context of scheduling and timetabling, we study a challenging combinatorial problem which is very interesting for both practical and theoretical points of view. The motivati...
Gianlorenzo D'Angelo, Gabriele Di Stefano, Alfredo...
DEBS
2009
ACM
14 years 5 months ago
Distributed agent environments in the Ambient Event Calculus
We study the development of distributed agent environments as distributed event-based systems specified in the Ambient Event Calculus (AEC). The AEC is a logic-based formalism th...
Stefano Bromuri, Kostas Stathis
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
14 years 5 months ago
Distributed subgradient methods and quantization effects
Abstract— We consider a convex unconstrained optimization problem that arises in a network of agents whose goal is to cooperatively optimize the sum of the individual agent objec...
Angelia Nedic, Alexander Olshevsky, Asuman E. Ozda...
ICPP
2008
IEEE
14 years 5 months ago
Fast Source Switching for Gossip-Based Peer-to-Peer Streaming
In this paper we consider gossip-based Peer-to-Peer streaming applications where multiple sources exist and they work serially. More specifically, we tackle the problem of fast s...
Zhenhua Li, Jiannong Cao, Guihai Chen, Yan Liu