Sciweavers

782 search results - page 135 / 157
» Building Blocks for Agent Design
Sort
View
ATAL
2011
Springer
12 years 9 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
ROBOCUP
1999
Springer
115views Robotics» more  ROBOCUP 1999»
14 years 1 months ago
UBU Team
The underlying research topics and the architecture of the UBU team are briefly described. The aim of developing UBU is to subject a series of tools and procedures for agent decis...
Johan Kummeneje, David Lybäck, Håkan L....
JPDC
2006
141views more  JPDC 2006»
13 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
SI3D
2009
ACM
14 years 3 months ago
Crowd patches: populating large-scale virtual environments for real-time applications
Populating virtual environments (VEs) with large crowds is a subject that has been tackled for several years. Solutions have been proposed to offer realistic trajectories as well ...
Barbara Yersin, Jonathan Maïm, Julien Pettr&e...
ACSAC
2007
IEEE
14 years 3 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang