Sciweavers

1395 search results - page 128 / 279
» Communication Security in Multi-agent Systems
Sort
View
FGCN
2008
IEEE
200views Communications» more  FGCN 2008»
14 years 3 months ago
Fast Method for Multiple Human Face Segmentation in Color Image
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
ICC
2007
IEEE
14 years 3 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
14 years 1 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...
CCS
2008
ACM
13 years 11 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
MAS
1998
Springer
153views Communications» more  MAS 1998»
14 years 1 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...