Sciweavers

618 search results - page 73 / 124
» Applying Distributed Object Technology to Network Planning
Sort
View
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SEMWEB
2007
Springer
14 years 2 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
GIS
2009
ACM
14 years 1 months ago
Data structures and intersection algorithms for 3D spatial data types
Apart from visualization tasks, three-dimensional (3D) data management features are not or only hardly available in current spatial database systems and Geographic Information Sys...
Tao Chen, Markus Schneider
ICRA
2008
IEEE
135views Robotics» more  ICRA 2008»
14 years 3 months ago
Decentralized connectivity maintenance in mobile networks with bounded inputs
Abstract— A distributed control law that guarantees connectivity maintenance in a network of multiple mobile agents is presented. The control law respects the limited sensing cap...
Dimos V. Dimarogonas, Karl Henrik Johansson
DISCEX
2003
IEEE
14 years 2 months ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...