Sciweavers

792 search results - page 46 / 159
» Mixed-initiative security agents
Sort
View
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 2 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
AGENTS
2001
Springer
14 years 1 months ago
Agents teaching agents to share meaning
The development of the semantic Web will require agents to use common domain ontologies to facilitate communication of conceptual knowledge. However, the proliferation of domain on...
Andrew B. Williams, Zijian Ren
AGENTS
2000
Springer
14 years 1 months ago
Tools for Developing and Monitoring Agents in Distributed Multi-Agent Systems
Before the powerful agent programming paradigm can be adopted in commercial or industrial settings, a complete environment, similar to that for other programming languages, must b...
John R. Graham, Daniel McHugh, Michael Mersic, Fos...
ESAW
2003
Springer
14 years 2 months ago
A Liberal Approach to Openness in Societies of Agents.
We outline a model for a society of agents based upon one of the classical theories of sociology: The Weber’s model. We first investigate its links to agent technology through i...
Jacques Calmet, Anusch Daemi, Regine Endsuleit, Th...
AGENTS
2000
Springer
14 years 1 months ago
Design-to-Criteria Scheduling: Real-Time Agent Control
Design-to-Criteria builds custom schedules for agents that meet hard temporal constraints, hard resource constraints, and soft constraints stemming from soft task interactions or ...
Thomas Wagner, Victor R. Lesser