Sciweavers

1519 search results - page 210 / 304
» Authentication for Mobile Agents
Sort
View
MATA
2000
Springer
14 years 2 months ago
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture
Abstract. The ACORN provides an agent-based architecture for information retrieval and provision across networks. The main objective of this paper is to present the design and impl...
Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Step...
ESM
1998
14 years 16 days ago
Developing Interest Management Techniques in Distributed Interactive Simulation Using Java
Bandwidth consumption in distributed real-time simulation, or networked real-time simulation, is a major problem as the number of participants and the sophistication of joint simu...
Jon Saville, Simon J. E. Taylor
MONET
2002
185views more  MONET 2002»
13 years 11 months ago
An Adaptive Generalized Transmission Protocol for Ad Hoc Networks
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
Andrew D. Myers, Gergely V. Záruba, Violet ...
RAS
2007
169views more  RAS 2007»
13 years 10 months ago
Decentralized cooperative control of heterogeneous vehicle groups
We coordinate in discrete time the interaction of two heterogeneous groups of mobile agents: a group of ground vehicles (ugvs) and a group of aerial vehicles (uavs). The ground ag...
Herbert G. Tanner, D. K. Christodoulakis
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
13 years 6 months ago
Sufficient conditions for flocking via graph robustness analysis
In this paper, we consider a multi-agent system consisting of mobile agents with second-order dynamics. The communication network is determined by a standard interaction rule based...
Samuel Martin, Antoine Girard