Sciweavers

2394 search results - page 358 / 479
» Implementing Mobile Haskell
Sort
View
USENIX
1994
13 years 11 months ago
Large Granularity Cache Coherence for Intermittent Connectivity
To function in mobile computing environments, distributed file systems must cope with networks that are slow, intermittent, or both. Intermittence vitiates the effectiveness of ca...
Lily B. Mummert, Mahadev Satyanarayanan
WOA
2007
13 years 11 months ago
A Framework for Interacting Situated Agents in Virtual Environments
—This paper presents a framework supporting the definition and implementation of virtual environment inhabited by interacting situated agents defined according to the Multilayere...
Giuseppe Vizzari, Giorgio Pizzi, Flávio S. ...
ESORICS
2010
Springer
13 years 11 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 11 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
HAIS
2008
Springer
13 years 11 months ago
Design Patterns for Combining Social and Individual Intelligences on Modular-Based Agents
Design patterns have been recently concerned in the multi-agent community for the design of systems with decentralized coordination. In this paper we present a design pattern for d...
Bianca Innocenti, Beatriz López, Joaquim Sa...