Sciweavers

41 search results - page 6 / 9
» Market-Based Resource Control for Mobile Agents
Sort
View
IEEEIA
2009
13 years 4 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
AAAI
2004
13 years 8 months ago
Interleaving Temporal Planning and Execution in Robotics Domains
Many autonomous systems such as mobile robots, UAVs or spacecraft, have limited resource capacities and move in dynamic environments. Performing on-board mission planning and exec...
Solange Lemai, Félix Ingrand
NBIS
2007
Springer
14 years 25 days ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
AAAI
2008
13 years 9 months ago
On-line Planning and Scheduling: An Application to Controlling Modular Printers
This paper summarizes recent work reported at ICAPS on applying artificial intelligence techniques to the control of production printing equipment. Like many other real-world appl...
Minh Binh Do, Wheeler Ruml, Rong Zhou
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 6 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara