Sciweavers

1519 search results - page 275 / 304
» Authentication for Mobile Agents
Sort
View
BCEC
1997
13 years 11 months ago
Adaptive Task Allocation Inspired by a Model of Division of Labor in Social Insects
Social insects provide us with a powerful metaphor to create decentralized systems of simple interacting, and often mobile, agents. The emergent collective intelligence of social i...
Eric Bonabeau, Andrej Sobkowski, Guy Theraulaz, Je...
WSC
2000
13 years 11 months ago
An agent-based framework for linking distributed simulations
Simulations often operate on static datasets and data sources, but many simulations would benefit from access to dynamic data. This paper describes our work developing a software ...
Linda F. Wilson, Daniel Burroughs, Jeanne Sucharit...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 11 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
KES
2006
Springer
13 years 9 months ago
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
Abstract. This paper presents a new multi-agent physics-based simulation framework (DISCOVERY), supporting experiments with self-organizing underwater sensor and actuator networks....
Vadim Gerasimov, Gerry Healy, Mikhail Prokopenko, ...
AUTOMATICA
2005
94views more  AUTOMATICA 2005»
13 years 9 months ago
A hierarchical cyclic pursuit scheme for vehicle networks
The agreement problem is studied whereby a group of mobile agents achieves convergence to a common point. A hierarchical cyclic pursuit scheme is introduced, and it is shown that ...
Stephen L. Smith, Mireille E. Broucke, Bruce A. Fr...