Sciweavers

3821 search results - page 198 / 765
» A Security Model for Aglets
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 2 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
SSR
2001
104views more  SSR 2001»
13 years 10 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
ANCS
2009
ACM
13 years 7 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...
AGENTS
1999
Springer
14 years 1 months ago
An Adaptive Agent Bidding Strategy Based on Stochastic Modeling
For a dynamic, evolving multiagent auction, we have developed an adaptive agent bidding strategy (called the p-strategy) based on stochastic modeling. The p-strategy takes into ac...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
ICDCS
2010
IEEE
14 years 1 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...