• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,133
Next 10 →

Authentication in distributed systems: Theory and practice

by Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - ACM Transactions on Computer Systems , 1992
"... ..."
Abstract - Cited by 515 (31 self) - Add to MetaCart
Abstract not found

Some Hints on the Theory and Practice of Authentication in Distributed Systems

by Tage Stabell-kulø, Andrea Bottoni , 1995
"... Authentication in Distributed Systems: Theory and Practice [9] provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of some tricky points. This is the revised version. ..."
Abstract - Add to MetaCart
Authentication in Distributed Systems: Theory and Practice [9] provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of some tricky points. This is the revised version.

Agent theories, architectures, and languages: a survey

by Michael J. Wooldridge, Nicholas R. Jennings , 1995
"... The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design and ..."
Abstract - Cited by 321 (2 self) - Add to MetaCart
The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design

Multi-Cell MIMO Cooperative Networks: A New Look at Interference

by David Gesbert, Stephen Hanly, Howard Huang, Shlomo Shamai Shitz, Osvaldo Simeone, Wei Yu - J. Selec. Areas in Commun. (JSAC , 2010
"... Abstract—This paper presents an overview of the theory and currently known techniques for multi-cell MIMO (multiple input multiple output) cooperation in wireless networks. In dense networks where interference emerges as the key capacitylimiting factor, multi-cell cooperation can dramatically improv ..."
Abstract - Cited by 257 (40 self) - Add to MetaCart
different perspectives, including an examination of the fundamental information-theoretic limits, a review of the coding and signal processing algorithmic developments, and, going beyond that, consideration of very practical issues related to scalability and system-level integration. A few promising

The GrADS project: Software support for high-level grid application development

by Francine Berman, Andrew Chien, Keith Cooper, Jack Dongarra, Ian Foster, Dennis Gannon, Lennart Johnsson, Ken Kennedy, Carl Kesselman, Dan Reed, Linda Torczon, Rich Wolski - International Journal of High Performance Computing Applications , 2001
"... Advances in networking technologies will soon make it possible to use the global information infrastructure in a qualitatively different way—as a computational resource as well as an information resource. This idea for an integrated computation and information resource called the Computational Power ..."
Abstract - Cited by 162 (24 self) - Add to MetaCart
, distributed supercomputing, tele-immersion, smart instruments, and data mining. To realize this vision, significant scientific and technical obstacles must be overcome. Principal among these is usability. Because the Grid will be inherently more complex than existing computer systems, programs that execute

Theory and Practice of Bloom Filters for Distributed Systems

by Sasu Tarkoma, Christian Esteve Rothenberg, Eemil Lagerspetz
"... Many network solutions and overlay networks utilize probabilistic techniques to reduce information processing and networking costs. This survey article presents a number of frequently used and useful probabilistic techniques. Bloom filters and their variants are of prime importance, and they are h ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
, and they are heavily used in various distributed systems. This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom filters. In this survey, we give an overview of the basic and advanced techniques, reviewing over

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
of her/his/their action. The consolidation of shared meaning through cr ystallization of practices in spatio-temporal con gurations creates cultures, that is systems of values and beliefs informing codes of behaviour. There is no systemic dominance in this matrix of relationships. There are all layers

Design, Verification and Implementation of an Authentication Protocol

by Thomas Y. C. Woo, Simon S. Lam - In Proceedings of International Conference on Network Protocols , 1994
"... We present an account of the entire development cycle (i.e., design, specification and verification, and implementation) of a realistic authentication protocol, which is part of a security architecture proposed by us. The protocol's design follows a stepwise refinement process, which we illustr ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
protocol implementations. We believe that the global perspective presented in this paper would be of great value to protocol designers, verifiers, and implementors, and contribute toward bridging the gap between the theory and practice of authentication protocol design. 1 Introduction Authentication is a

Unifying Theory and Practice in Distributed Systems

by Marc Shapiro , David Plainfossé , Paulo Ferreira , Laurent Amsaleg
"... Abstract The design of garbage collectors combines both theoretical aspects (safety and liveness) and practical ones (such as efficiency, inobtrusiveness, ease of implementation, fault tolerance, etc.). Although distributed GC is an instance of a consistency problem, practical designs often use wea ..."
Abstract - Add to MetaCart
Abstract The design of garbage collectors combines both theoretical aspects (safety and liveness) and practical ones (such as efficiency, inobtrusiveness, ease of implementation, fault tolerance, etc.). Although distributed GC is an instance of a consistency problem, practical designs often use

Opportunity-based topology control in wireless sensor networks

by Yunhuai Liu, Qian Zhang, Lionel Ni - in ICDCS , 2008
"... Topology control is an effective method to improve the energy efficiency of wireless sensor networks (WSNs). Traditional approaches are based on the assumption that a pair of nodes is either “connected ” or “disconnected”. These approaches are called connectivity-based topology control. In real envi ..."
Abstract - Cited by 139 (21 self) - Add to MetaCart
-based topology control is a problem of NPhard. To address this problem in a practical way, we design a fully distributed algorithm called CONREAP based on reliability theory. We prove that CONREAP has a guaranteed performance. The worst running time is O(|E|) where E is the link set of the original topology
Next 10 →
Results 1 - 10 of 1,133
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University