Sciweavers

1088 search results - page 200 / 218
» A Distributed Architecture for Norm Management in Multi-Agen...
Sort
View
AICT
2006
IEEE
163views Communications» more  AICT 2006»
14 years 1 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
DRMTICS
2005
Springer
14 years 29 days ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
SAC
2004
ACM
14 years 25 days ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
MOBIDE
2003
ACM
14 years 20 days ago
TiNA: a scheme for temporal coherency-aware in-network aggregation
This paper presents TiNA, a scheme for minimizing energy consumption in sensor networks by exploiting end-user tolerance to temporal coherency. TiNA utilizes temporal coherency to...
Mohamed A. Sharaf, Jonathan Beaver, Alexandros Lab...
DOLAP
2000
ACM
13 years 11 months ago
Incremental Update to Aggregated Information for Data Warehouses over Internet
We consider the view maintenance problem in a web-based environment, in which clients query information from databases, stored in the form of materialized data warehouses, without...
Miranda Chan, Hong Va Leong, Antonio Si