Sciweavers

112 search results - page 14 / 23
» Agent Organized Networks Redux
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 7 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
AAAI
2008
13 years 9 months ago
Decoding Wikipedia Categories for Knowledge Acquisition
This paper presents an approach to acquire knowledge from Wikipedia categories and the category network. Many Wikipedia categories have complex names which reflect human classific...
Vivi Nastase, Michael Strube
SSR
2001
104views more  SSR 2001»
13 years 8 months ago
Secure and efficient mobile agent application reuse using patterns
As wide-area open networks like the Internet and intranets grow larger, mobile agent technology is attracting more attention. Mobile agents are units of software that can deal wit...
Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga,...
CHI
1997
ACM
13 years 11 months ago
How to Personalize the Web
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Rob Barrett, Paul P. Maglio, Daniel C. Kellem
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...