Sciweavers

1519 search results - page 212 / 304
» Authentication for Mobile Agents
Sort
View
KES
2010
Springer
13 years 8 months ago
OVACARE: A Multi-Agent System for Assistance and Health Care
This paper presents a case study in which the OVAMAH architecture is applied in order to obtain a multi-agent system (MAS) that can provide assistance and health care for Alzheimer...
Juan Francisco de Paz, Sara Rodríguez, Javi...
ICPADS
2007
IEEE
14 years 4 months ago
Performance analysis on mobile agent-based parallel information retrieval approaches
—The main concern of the Internet user-base has shifted from what kind of information are available to how to find the desired information on the Internet thanks to the explosiv...
Wenyu Qu, Masaru Kitsuregawa, Keqiu Li
ISSTA
2009
ACM
14 years 2 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
ICTAI
2010
IEEE
13 years 7 months ago
Pocket Data Mining: Towards Collaborative Data Mining in Mobile Computing Environments
Abstract--Pocket Data Mining PDM is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data stre...
Frederic T. Stahl, Mohamed Medhat Gaber, Max Brame...
ICCSA
2007
Springer
14 years 4 months ago
Route Optimization with Additional Destination-Information in Mobile Networks
Abstract. In nested mobile networks with NEMO basic support protocol [3], the pinball routing problem occurs because since it is based on bi-directional tunneling between the mobil...
Jeonghoon Park, Sangho Lee, Youho Lee, Hyunseung C...