Sciweavers

219 search results - page 34 / 44
» Countermeasures for mobile agent security
Sort
View
148
Voted
IEEEIA
2009
15 years 1 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
153
Voted
WICOMM
2008
258views more  WICOMM 2008»
15 years 3 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
128
Voted
AGENTS
1997
Springer
15 years 7 months ago
Ant-Like Agents for Load Balancing in Telecommunications Networks
This paper describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between arbitrary nodes;...
Ruud Schoonderwoerd, Owen Holland, Janet Bruten
170
Voted
ISCIS
2004
Springer
15 years 9 months ago
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such ...
Luís Almeida, Frederico Santos, Tullio Facc...
151
Voted
AISADM
2005
Springer
15 years 9 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...