Sciweavers

2808 search results - page 471 / 562
» Mobile Agent Security
Sort
View
CIIT
2004
111views Communications» more  CIIT 2004»
15 years 4 months ago
Scalable ant-based routing algorithm for ad-hoc networks
Ants-based routing algorithms have attracted the attention of researchers because they are more robust, reliable, and scalable than other conventional routing algorithms. Since th...
Yoshitaka Ohtaki, Naoki Wakamiya, Masayuki Murata,...
DAGSTUHL
1994
15 years 4 months ago
A Distributed Control Architecture for Autonomous Robot Systems
The main advantage of distributed controlled robots and subsystems is the decentralized task execution by the system components. This way, properties for the design of flexible co...
Thomas Laengle, Tim Lüth, Ulrich Rembold
IJCAI
1993
15 years 4 months ago
Using Local Information in a Non-Local Way for Mapping Graph-Like Worlds
This paper describes a technique whereby an autonomous agent such as a mobile robot can explore an unknown environment and make a topologicalmapofit. It is assumedthat the environ...
Gregory Dudek, Paul Freedman, Souad Hadjres
HCI
2009
15 years 28 days ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
MOBISYS
2008
ACM
16 years 2 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...