Sciweavers

2912 search results - page 485 / 583
» Architecture for Providing Services in the Ubiquitous Comput...
Sort
View
CISIS
2009
IEEE
14 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
IEEEARES
2006
IEEE
14 years 3 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
EDOC
2003
IEEE
14 years 2 months ago
An Efficient, Scalable Content-Based Messaging System
Large-scale information processing environments must rapidly search through massive streams of raw data to locate useful information. These data streams contain textual and numeri...
Ian Gorton, Justin Almquist, Nick Cramer, Jereme H...
ACSAC
2001
IEEE
14 years 27 days ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
AGENTS
2001
Springer
14 years 1 months ago
Tears and fears: modeling emotions and emotional behaviors in synthetic agents
Emotions play a critical role in creating engaging and believable characters to populate virtual worlds. Our goal is to create general computational models to support characters t...
Jonathan Gratch, Stacy Marsella