Sciweavers

2200 search results - page 404 / 440
» Hop Integrity in Computer Networks
Sort
View
ATAL
2003
Springer
15 years 6 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
VLDB
1995
ACM
116views Database» more  VLDB 1995»
15 years 6 months ago
W3QS: A Query System for the World-Wide Web
The World-Wide Web (WWW) is an ever growing, distributed, non-administered, global information resource. It resides on the worldwide computer network and allows access to heteroge...
David Konopnicki, Oded Shmueli
108
Voted
ATAL
2008
Springer
15 years 4 months ago
Cooperative search for optimizing pipeline operations
We present an application of a multi-agent cooperative search approach to the problem of optimizing gas pipeline operations, i.e. finding control parameters for a gas transmission...
T. Mora, Abu B. Sesay, Jörg Denzinger, Hossei...
AMR
2008
Springer
248views Multimedia» more  AMR 2008»
15 years 4 months ago
Mobile Museum Guide Based on Fast SIFT Recognition
Abstract. This article explores the feasibility of a market-ready, mobile pattern recognition system based on the latest findings in the field of object recognition and currently a...
Boris Ruf, Effrosini Kokiopoulou, Marcin Detynieck...
121
Voted
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
15 years 4 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...