Sciweavers

639 search results - page 120 / 128
» A Finite State Mobile Agent Computation Model
Sort
View
ICRA
2002
IEEE
94views Robotics» more  ICRA 2002»
15 years 9 months ago
Sensor Planning and Control in a Dynamic Environment
This paper presents an approach to the problem of controlling the configuration of a team of mobile agents equipped with cameras so as to optimize the quality of the estimates de...
John R. Spletzer, Camillo J. Taylor
134
Voted
ICTAC
2005
Springer
15 years 9 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
ENVSOFT
2006
72views more  ENVSOFT 2006»
15 years 4 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
153
Voted
CCS
2005
ACM
15 years 9 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
130
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee