Sciweavers

2808 search results - page 464 / 562
» Mobile Agent Security
Sort
View
COMPSAC
2005
IEEE
14 years 4 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
14 years 4 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...
ENTCS
2006
138views more  ENTCS 2006»
13 years 11 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
APNOMS
2009
Springer
14 years 5 months ago
A Scheme for Supporting Optimal Path in 6LoWPAN Based MANEMO Networks
In this paper, we focus on the scheme for the route optimization in 6LoWPAN based MANEMO environments. If 6LoWPAN mobile routers for supporting NEMO protocol are organized by neste...
Jin Ho Kim, Choong Seon Hong
MHCI
2009
Springer
14 years 5 months ago
Hoverflow: exploring around-device interaction with IR distance sensors
By equipping a mobile device with distance sensing capabilities, we aim to expand the interaction possibilities of mobile and wearable devices beyond the confines of the physical ...
Sven G. Kratz, Michael Rohs