Sciweavers

916 search results - page 44 / 184
» Activity Theory for the Analysis and Design of Multi-agent S...
Sort
View
TELSYS
2010
147views more  TELSYS 2010»
13 years 3 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
ISWC
2003
IEEE
14 years 2 months ago
Unsupervised, Dynamic Identification of Physiological and Activity Context in Wearable Computing
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
NORMAS
2005
Springer
14 years 2 months ago
A Framework for the Design of Self-Regulation of Open Agent-based Electronic Marketplaces
In this paper, we argue that allowing self-interested agents to activate social institutions during run-time can improve the robustness (i.e., stability, cooperation or fairness) ...
Christian S. Hahn, Bettina Fley, Michael Florian
DSD
2005
IEEE
102views Hardware» more  DSD 2005»
14 years 2 months ago
Educational Tool for the Demonstration of DfT Principles Based on Scan Methodologies
In the paper, the principles of Scan Educational Tool are presented. First, the motivation for this activity is briefly mentioned. Then, the structure of software package together...
Josef Strnadel, Zdenek Kotásek