Sciweavers

42 search results - page 6 / 9
» A Novel Method to Maintain Privacy in Mobile Agent Applicati...
Sort
View
EDOC
2004
IEEE
13 years 11 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 7 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
AAAI
2008
13 years 9 months ago
Generalized Point Based Value Iteration for Interactive POMDPs
We develop a point based method for solving finitely nested interactive POMDPs approximately. Analogously to point based value iteration (PBVI) in POMDPs, we maintain a set of bel...
Prashant Doshi, Dennis Perez
ICRA
2009
IEEE
155views Robotics» more  ICRA 2009»
14 years 2 months ago
Automatic formation deployment of decentralized heterogeneous multi-robot networks with limited sensing capabilities
— Heterogeneous multi-robot networks require novel tools for applications that require achieving and maintaining formations. This is the case for distributing sensing devices wit...
Brian Stephen Smith, Jiuguang Wang, Magnus Egerste...
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 7 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang