Sciweavers

8080 search results - page 87 / 1616
» From Computer Networks to Agent Networks
Sort
View
103
Voted
ESAW
2004
Springer
15 years 8 months ago
T-Compound Interaction and Overhearing Agents
Overhearing is an indirect interaction type that enacts agents to listen to direct interactions among other agents without taking explicit part in the exchanges. In this paper, we ...
Eric Platon, Nicolas Sabouret, Shinichi Honiden
116
Voted
RAID
1999
Springer
15 years 7 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
169
Voted
SAC
2000
ACM
15 years 7 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
122
Voted
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 2 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
ICASSP
2009
IEEE
15 years 9 months ago
Interval consensus: From quantized gossip to voting
We design distributed and quantized average consensus algorithms on arbitrary connected networks. By construction, quantized algorithms cannot produce a real, analog average. Inst...
Florence Bénézit, Patrick Thiran, Ma...