Sciweavers

1225 search results - page 61 / 245
» Designing Distributed Applications with Mobile Code Paradigm...
Sort
View
SAC
2004
ACM
15 years 8 months ago
A secure method for signature delegation to mobile agents
This paper presents a novel method that allows the delegation of signature power to one or more entities that jointly play the role of a proxy signer. This work is different from ...
Omaima Bamasak, Ning Zhang
117
Voted
ETFA
2006
IEEE
15 years 8 months ago
An IEC61499 Execution Environment for an aJile-based Field Device
—The IEC61499 standard is the first step towards the development of the next generation agile manufacturing systems where distribution, interoperability and re-configuration are ...
Kleanthis Thramboulidis, Nikolaos Papakonstantinou
104
Voted
IPPS
2003
IEEE
15 years 7 months ago
Anonymous Publish/Subscribe in P2P Networks
One of the most important issues to deal with in peerto-peer networks is how to disseminate information. In this paper, we use a completely new approach to solving the information...
Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal,...
119
Voted
IJWIS
2006
87views more  IJWIS 2006»
15 years 2 months ago
Systematic Development of Physical Hypermedia Applications
Abstract. In this paper we present a model-based approach for the development of physical hypermedia applications, i.e. those mobile (Web) applications in which physical and digita...
Cecilia Challiol, Gustavo Rossi, Silvia E. Gordill...
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 7 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...