We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
—Owing to the absence of any static support structure, Ad-hoc networks are prone to link failures. The ‘shortest path seeking’ routing protocols may not lead to stable routes...
Sulabh Agarwal, Ashish Ahuja, Jatinder Pal Singh, ...
In this paper we present practical experiences gathered from the employment of two popular Java-based mobile-agent platforms, IBM's Aglets and Mitsubishi's Concordia. We...
George Samaras, Marios D. Dikaiakos, Constantinos ...
Object recognition has been widely researched for several decades and in the recent years new methods capable of general object classification have appeared. However very few work ...
- In this paper, we proposed an automatic pushing system, whereby the users of mobile devices set their preferences on the Internet and receive `pushed' contents, which are a ...