Sciweavers

3638 search results - page 104 / 728
» Distribution chain security
Sort
View
117
Voted
EDOC
2004
IEEE
15 years 6 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
116
Voted
AGENTS
2000
Springer
15 years 7 months ago
Unsupervised clustering of robot activities: a Bayesian approach
Our goal is for robots to learn conceptual systems su cient for natural language and planning. The learning should be autonomous, without supervision. The rst steps in building a ...
Marco Ramoni, Paola Sebastiani, Paul R. Cohen
129
Voted
ICICS
2009
Springer
15 years 9 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
ICC
2007
IEEE
15 years 9 months ago
Secure Bootstrapping of Distributed Hash Tables in Dynamic Wireless Networks
Lawrence Cheng, Kerry Jean, Roel Ocampo, Alex Gali...
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 8 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich