Sciweavers

347 search results - page 62 / 70
» A Security Framework for a Mobile Agent System
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
14 years 2 months ago
A Low-cost and High-performance SoC Design for OMA DRM2 Applications
A SoC design for applications of OMA DRM 2 Agent in mobile phones is presented in this paper, which has been verified by Altera Stratix EP1S80B956C6 FPGA development board. Several...
Yehua Gu, Xiaoyang Zeng, Jun Han, Jia Zhao
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
14 years 1 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
COOPIS
2000
IEEE
14 years 18 days ago
An Evaluation of the Java-Based Approaches to Web Database Access
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information system...
Stavros Papastavrou, Panos K. Chrysanthis, George ...
DAGM
1999
Springer
14 years 14 days ago
Cooperative Distributed Vision: Dynamic Integration of Visual Perception, Action, and Communication
We believe intelligence does not dwell solely in brain but emerges from active interactions with environments through perception, action, and communication. This paper give an over...
Takashi Matsuyama