Sciweavers

55 search results - page 5 / 11
» Mobile Agent Security with Efficient Oblivious Transfer
Sort
View
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 1 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
MONET
2006
173views more  MONET 2006»
13 years 7 months ago
Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks
We analyze an architecture based on mobility to address the problem of energy efficient data collection in a sensor network. Our approach exploits mobile nodes present in the senso...
Sushant Jain, Rahul Shah, Waylon Brunette, Gaetano...
SIROCCO
2008
13 years 9 months ago
Remembering without Memory: Tree Exploration by Asynchronous Oblivious Robots
In the effort to understand the algorithmic limitations of computing by a swarm of robots, the research has focused on the minimal capabilities that allow a problem to be solved. ...
Paola Flocchini, David Ilcinkas, Andrzej Pelc, Nic...
SAC
2002
ACM
13 years 7 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
14 years 23 days ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan