Voluntary Cooperation in Pervasive Computing Services
暂无分享,去创建一个
[1] Ralph Wittmann,et al. Delegating Remote Operation Execution in a Mobile Computing Environment , 1996, Mob. Networks Appl..
[2] Morris Sloman,et al. Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..
[3] Jean-Philippe Martin-Flatin,et al. Push vs. pull in Web-based network management , 1998, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).
[4] Siri Fagernes,et al. Pervasive Computer Management: A Model of Network Policy with Local Autonomy , 2006 .
[5] Monica S. Lam,et al. Virtual Appliances in the Collective: A Road to Hassle-Free Computing , 2003, HotOS.
[6] Andrew M. Colman,et al. The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..
[7] Howard Rheingold,et al. Smart Mobs: The Next Social Revolution , 2002 .
[8] Sally Floyd,et al. Wide area traffic: the failure of Poisson modeling , 1995, TNET.
[9] James F. Doyle,et al. Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.
[10] Mark Burgess,et al. A Site Configuration Engine , 1995, Comput. Syst..
[11] B. R. Badrinath,et al. Reworking the RPC Paradigm for Mobile Clients , 1996, Mob. Networks Appl..
[12] Valérie Issarny,et al. Analyzing Non-functional Properties of Mobile Agents , 2000, FASE.
[13] Alva L. Couch,et al. Selected Papers in Network and System Administration , 2001 .
[14] Mark Burgess,et al. Scalability of Peer Configuration Management in Logically Ad Hoc Networks , 2004, IEEE Transactions on Network and Service Management.
[15] Gesine Reinert,et al. Small worlds , 2001, Random Struct. Algorithms.
[16] Jeffrey D. Case,et al. Simple network management protocol , 1995 .
[17] Paolo Bellavista,et al. Policy-Driven Binding to Information Resources in Mobility-Enabled Scenarios , 2003, Mobile Data Management.
[18] Oswald Drobnik,et al. Agent-based configuration management of distributed applications , 1996, Proceedings of International Conference on Configurable Distributed Systems.
[19] Mark Burgess,et al. A graph-theoretical model of computer security , 2004, International Journal of Information Security.
[20] Mark Burgess,et al. An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation , 2005, DSOM.
[21] Xiaohua Jia,et al. A reliable asynchronous RPC architecture for wireless networks , 2002, Comput. Commun..
[22] Kurt Geihs,et al. Decentralized SNMP management with mobile agents , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).
[23] A. Colman,et al. The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..
[24] Anupam Joshi,et al. A Secure Infrastructure for Service Discovery and Access in Pervasive Computing , 2003, Mob. Networks Appl..