Sciweavers

457 search results - page 80 / 92
» Agents as Catalysts for Mobile Computing
Sort
View
SEC
2001
13 years 8 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 8 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
SAC
2002
ACM
13 years 7 months ago
Coordination middleware for XML-centric applications
This paper focuses on coordination middleware for distributed applications based on active documents and XML technologies. It introduces the main concepts underlying active docume...
Paolo Ciancarini, Robert Tolksdorf, Franco Zambone...
ICCSA
2005
Springer
14 years 26 days ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
COOPIS
2003
IEEE
14 years 20 days ago
Analysing Mailboxes of Asynchronous Communicating Components
Abstract. Asynchronous communications are prominent in distributed and mobile systems. Often consystems consider an abstract point of view with synchronous communications. However ...
Jean-Claude Royer, Michael Xu