Results 1 - 10
of
1,133
Authentication in distributed systems: Theory and practice
- ACM Transactions on Computer Systems
, 1992
"... ..."
Some Hints on the Theory and Practice of Authentication in Distributed Systems
, 1995
"... Authentication in Distributed Systems: Theory and Practice [9] provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of some tricky points. This is the revised version. ..."
Abstract
- Add to MetaCart
Authentication in Distributed Systems: Theory and Practice [9] provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of some tricky points. This is the revised version.
Agent theories, architectures, and languages: a survey
, 1995
"... The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design and ..."
Abstract
-
Cited by 321 (2 self)
- Add to MetaCart
The concept of an agent has recently become important in Artificial Intelligence (AI), and its relatively youthful subfield, Distributed AI (DAI). Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design
Multi-Cell MIMO Cooperative Networks: A New Look at Interference
- J. Selec. Areas in Commun. (JSAC
, 2010
"... Abstract—This paper presents an overview of the theory and currently known techniques for multi-cell MIMO (multiple input multiple output) cooperation in wireless networks. In dense networks where interference emerges as the key capacitylimiting factor, multi-cell cooperation can dramatically improv ..."
Abstract
-
Cited by 257 (40 self)
- Add to MetaCart
different perspectives, including an examination of the fundamental information-theoretic limits, a review of the coding and signal processing algorithmic developments, and, going beyond that, consideration of very practical issues related to scalability and system-level integration. A few promising
The GrADS project: Software support for high-level grid application development
- International Journal of High Performance Computing Applications
, 2001
"... Advances in networking technologies will soon make it possible to use the global information infrastructure in a qualitatively different way—as a computational resource as well as an information resource. This idea for an integrated computation and information resource called the Computational Power ..."
Abstract
-
Cited by 162 (24 self)
- Add to MetaCart
, distributed supercomputing, tele-immersion, smart instruments, and data mining. To realize this vision, significant scientific and technical obstacles must be overcome. Principal among these is usability. Because the Grid will be inherently more complex than existing computer systems, programs that execute
Theory and Practice of Bloom Filters for Distributed Systems
"... Many network solutions and overlay networks utilize probabilistic techniques to reduce information processing and networking costs. This survey article presents a number of frequently used and useful probabilistic techniques. Bloom filters and their variants are of prime importance, and they are h ..."
Abstract
-
Cited by 30 (0 self)
- Add to MetaCart
, and they are heavily used in various distributed systems. This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom filters. In this survey, we give an overview of the basic and advanced techniques, reviewing over
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
of her/his/their action. The consolidation of shared meaning through cr ystallization of practices in spatio-temporal con gurations creates cultures, that is systems of values and beliefs informing codes of behaviour. There is no systemic dominance in this matrix of relationships. There are all layers
Design, Verification and Implementation of an Authentication Protocol
- In Proceedings of International Conference on Network Protocols
, 1994
"... We present an account of the entire development cycle (i.e., design, specification and verification, and implementation) of a realistic authentication protocol, which is part of a security architecture proposed by us. The protocol's design follows a stepwise refinement process, which we illustr ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
protocol implementations. We believe that the global perspective presented in this paper would be of great value to protocol designers, verifiers, and implementors, and contribute toward bridging the gap between the theory and practice of authentication protocol design. 1 Introduction Authentication is a
Unifying Theory and Practice in Distributed Systems
"... Abstract The design of garbage collectors combines both theoretical aspects (safety and liveness) and practical ones (such as efficiency, inobtrusiveness, ease of implementation, fault tolerance, etc.). Although distributed GC is an instance of a consistency problem, practical designs often use wea ..."
Abstract
- Add to MetaCart
Abstract The design of garbage collectors combines both theoretical aspects (safety and liveness) and practical ones (such as efficiency, inobtrusiveness, ease of implementation, fault tolerance, etc.). Although distributed GC is an instance of a consistency problem, practical designs often use
Opportunity-based topology control in wireless sensor networks
- in ICDCS
, 2008
"... Topology control is an effective method to improve the energy efficiency of wireless sensor networks (WSNs). Traditional approaches are based on the assumption that a pair of nodes is either “connected ” or “disconnected”. These approaches are called connectivity-based topology control. In real envi ..."
Abstract
-
Cited by 139 (21 self)
- Add to MetaCart
-based topology control is a problem of NPhard. To address this problem in a practical way, we design a fully distributed algorithm called CONREAP based on reliability theory. We prove that CONREAP has a guaranteed performance. The worst running time is O(|E|) where E is the link set of the original topology
Results 1 - 10
of
1,133