Sciweavers

270 search results - page 52 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
CAISE
2003
Springer
14 years 1 months ago
A Portal for Ubiquitous Collaboration
This paper presents a software framework, called Collaborator, to provide a shared work-space supporting the activities of virtual teams. This system exploits seamless integration ...
Federico Bergenti, Socrates Costicoglou, Agostino ...
AAAI
2007
13 years 11 months ago
Near-optimal Observation Selection using Submodular Functions
AI problems such as autonomous robotic exploration, automatic diagnosis and activity recognition have in common the need for choosing among a set of informative but possibly expen...
Andreas Krause, Carlos Guestrin
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
SENSYS
2005
ACM
14 years 2 months ago
Intelligent light control using sensor networks
Increasing user comfort and reducing operation costs have always been two primary objectives of building operations and control strategies. Current building control strategies are...
Vipul Singhvi, Andreas Krause, Carlos Guestrin, Ja...
ICCSA
2005
Springer
14 years 2 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee