Sciweavers

2808 search results - page 471 / 562
» Mobile Agent Security
Sort
View
CIIT
2004
111views Communications» more  CIIT 2004»
13 years 11 months ago
Scalable ant-based routing algorithm for ad-hoc networks
Ants-based routing algorithms have attracted the attention of researchers because they are more robust, reliable, and scalable than other conventional routing algorithms. Since th...
Yoshitaka Ohtaki, Naoki Wakamiya, Masayuki Murata,...
DAGSTUHL
1994
13 years 11 months ago
A Distributed Control Architecture for Autonomous Robot Systems
The main advantage of distributed controlled robots and subsystems is the decentralized task execution by the system components. This way, properties for the design of flexible co...
Thomas Laengle, Tim Lüth, Ulrich Rembold
IJCAI
1993
13 years 11 months ago
Using Local Information in a Non-Local Way for Mapping Graph-Like Worlds
This paper describes a technique whereby an autonomous agent such as a mobile robot can explore an unknown environment and make a topologicalmapofit. It is assumedthat the environ...
Gregory Dudek, Paul Freedman, Souad Hadjres
HCI
2009
13 years 7 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
MOBISYS
2008
ACM
14 years 9 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...