Sciweavers

68 search results - page 9 / 14
» Determining Privileges of Mobile Agents
Sort
View
SCL
2010
102views more  SCL 2010»
13 years 7 months ago
Distributed control of triangular formations with angle-only constraints
—This paper considers the coupled formation control of three mobile agents moving in the plane. Each agent has only local inter-agent bearing knowledge and is required to maintai...
Meysam Basiri, Adrian N. Bishop, Patric Jensfelt
KES
2005
Springer
14 years 2 months ago
Synthetic Character with Bayesian Network and Behavior Network for Intelligent Smartphone
As more people get using mobile phones, smartphone which is a new generation of mobile phone with computing capability earns world-wide reputation as new personal business assistan...
Sang-Jun Han, Sung-Bae Cho
ICCNMC
2005
Springer
14 years 2 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
JPDC
2006
175views more  JPDC 2006»
13 years 8 months ago
Stochastic modeling and analysis of hybrid mobility in reconfigurable distributed virtual machines
Virtualization provides a vehicle to manage the available resources and enhance their utilization in network computing. System dynamics requires virtual machines be distributed an...
Song Fu, Cheng-Zhong Xu
ECOOPW
1999
Springer
14 years 25 days ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis