Sciweavers

270 search results - page 32 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
INFOCOM
1999
IEEE
14 years 28 days ago
Enhancing Survivability of Mobile Internet Access Using Mobile IP with Location Registers
The Mobile IP (MIP) protocol for IP version 4 provides continuous Internet connectivity to mobile hosts. However, currently it has some drawbacks in the areas of survivability, per...
Ravi Jain, Thomas Raleigh, Danny Yang, Li-Fung Cha...
CDC
2009
IEEE
164views Control Systems» more  CDC 2009»
13 years 12 months ago
Spectral Multiscale Coverage: A uniform coverage algorithm for mobile sensor networks
Abstract— In this paper we propose centralized feedback control laws for mobile sensor networks so that sensor trajectories cover a given domain as uniformly as possible. The des...
George Mathew, Igor Mezic
IJVR
2008
125views more  IJVR 2008»
13 years 8 months ago
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment
The Web3D technologies make it possible to create Collaborative Virtual Environment (CVE) in the popular Internet, thus promoting the popularity of CVE scientific applications to b...
Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, ...
ATAL
2003
Springer
14 years 9 days ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 8 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham