Sciweavers

2808 search results - page 472 / 562
» Mobile Agent Security
Sort
View
POPL
1998
ACM
14 years 2 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
ESAS
2004
Springer
14 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
DIMVA
2004
13 years 11 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
ICIP
2008
IEEE
14 years 11 months ago
Long term learning for image retrieval over networks
In this paper, we present a long term learning system for content based image retrieval over a network. Relevant feedback is used among different sessions to learn both the simila...
David Picard, Arnaud Revel, Matthieu Cord
GIS
2007
ACM
14 years 11 months ago
Topological maps from signals
We discuss the task of reconstructing the topological map of an environment based on the sequences of locations visited by a mobile agent ? this occurs in systems neuroscience, wh...
Yu. Dabaghian, Anthony G. Cohn, L. Frank