Sciweavers

68 search results - page 8 / 14
» Determining Privileges of Mobile Agents
Sort
View
CSREASAM
2006
13 years 10 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
TCS
2008
13 years 8 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
AAMAS
2005
Springer
14 years 2 months ago
Experiments in Subsymbolic Action Planning with Mobile Robots
The ability to determine a sequence of actions in order to reach a particular goal is of utmost importance to mobile robots. One major problem with symbolic planning approaches re...
John Pisokas, Ulrich Nehmzow
NETWORKS
2006
13 years 8 months ago
Black hole search in common interconnection networks
Mobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that de...
Stefan Dobrev, Paola Flocchini, Rastislav Kralovic...
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
13 years 3 months ago
Sufficient conditions for flocking via graph robustness analysis
In this paper, we consider a multi-agent system consisting of mobile agents with second-order dynamics. The communication network is determined by a standard interaction rule based...
Samuel Martin, Antoine Girard