Sciweavers

2645 search results - page 166 / 529
» Autonomous security for autonomous systems
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 9 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
VOTEID
2007
Springer
15 years 10 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
AUTOMATICA
2007
86views more  AUTOMATICA 2007»
15 years 4 months ago
Switched seesaw control for the stabilization of underactuated vehicles
This paper addresses the stabilization of a class of nonlinear systems in the presence of disturbances, using switching controllers. To this effect we introduce two new classes o...
A. Pedro Aguiar, João P. Hespanha, Ant&oacu...
AUTONOMICS
2007
ACM
15 years 8 months ago
Featuring trust and reputation management systems for constrained hardware devices
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the ...
Rodrigo Roman, M. Carmen Fernández Gago, Ja...
ECEH
2006
114views Healthcare» more  ECEH 2006»
15 years 5 months ago
The Challenges of Electronic Prescription Systems Based on Semantic Web Technologies
: The technology developed for interoperable autonomous systems has significantly changed during the past few years. However, this new technology based on Semantic Web is not yet d...
Juha Puustjärvi, Leena Puustjärvi