Sciweavers

347 search results - page 60 / 70
» A Security Framework for a Mobile Agent System
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
DLOG
2010
13 years 6 months ago
An Algebraic Approach to Dynamic Epistemic Logic
Dynamic epistemic logic plays a key role in reasoning about multi-agent systems. Past approaches to dynamic epistemic logic have typically been focused on actions whose primary pur...
Prakash Panangaden, Caitlin Phillips, Doina Precup...
ATAL
2006
Springer
13 years 12 months ago
Enhancing agent-oriented models with aspects
The modular representation of concerns is imperative in the design modeling of multi-agent systems (MASs). However, MAS designers typically face a number of concerns that inherent...
Alessandro F. Garcia, Christina Chavez, Ricardo Ch...
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ATAL
2006
Springer
13 years 12 months ago
MLBP: MAS for large-scale biometric pattern recognition
Abstract. Security systems can observe and hear almost anyone everywhere. However, it is impossible to employ an adequate number of human experts to analyze the information explosi...
Ram Meshulam, Shulamit Reches, Aner Yarden, Sarit ...