Sciweavers

2645 search results - page 88 / 529
» Autonomous security for autonomous systems
Sort
View
156
Voted
ESORICS
2012
Springer
13 years 6 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
135
Voted
JSAC
2010
107views more  JSAC 2010»
15 years 2 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
144
Voted
ICC
2007
IEEE
162views Communications» more  ICC 2007»
15 years 10 months ago
Ontology-Based Reasoning for Supporting Context-Aware Services on Autonomic Networks
- Ontology engineering has been proposed as a formal mechanism for both reducing the complexity of managing the information needed in network management and autonomic systems and f...
Jaime Martín Serrano, Joan Serrat, John Str...
114
Voted
IVA
2001
Springer
15 years 8 months ago
Autonomous Avatars? From Users to Agents and Back
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
Matthias Scheutz, Brigitte Römmer
136
Voted
SCAI
2001
15 years 5 months ago
Using Situated Communication in Distributed Autonomous Mobile Robotics
When using communication in multi-robot systems it's often not desirable to choose an form of communication that separates the messages from the physical environment in which...
Kasper Støy