Sciweavers

1266 search results - page 132 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PVLDB
2008
104views more  PVLDB 2008»
15 years 3 months ago
Scalable multi-query optimization for exploratory queries over federated scientific databases
The diversity and large volumes of data processed in the Natural Sciences today has led to a proliferation of highlyspecialized and autonomous scientific databases with inherent a...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...
AR
2005
115views more  AR 2005»
15 years 4 months ago
Insights toward robot-assisted evacuation
This paper discusses the application of robotic technologies to an evacuation assistance task. We describe how this kind of task differs from the more prevalent search and rescue ...
Dylan A. Shell, Maja J. Mataric
SAC
2010
ACM
15 years 11 months ago
Quality of service for multicasting using NICE
To distribute data from one sender to multiple receivers efficiently and concurrently, multicasting is one of the most appropriate mechanisms. Application Layer Multicast (ALM), ...
Marc Brogle, Sebastian Barthlomé, Torsten B...
HPCA
1998
IEEE
15 years 8 months ago
Exploiting Two-Case Delivery for Fast Protected Messaging
We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer. The techniques allow efficient, direct appli...
Kenneth Mackenzie, John Kubiatowicz, Matthew Frank...
ATAL
2007
Springer
15 years 10 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee