Sciweavers

2808 search results - page 487 / 562
» Mobile Agent Security
Sort
View
CEC
2010
IEEE
13 years 11 months ago
A hormone-based controller for evolutionary multi-modular robotics: From single modules to gait learning
For any embodied, mobile, autonomous agent it is essential to control its actuators appropriately for the faced task. This holds for natural organisms as well as for robots. If sev...
Heiko Hamann, Jürgen Stradner, Thomas Schmick...
CJ
2002
122views more  CJ 2002»
13 years 9 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
JSS
2002
198views more  JSS 2002»
13 years 9 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
IEEEARES
2009
IEEE
14 years 4 months ago
Generating User-Understandable Privacy Preferences
—Making use of the World Wide Web’s numerous services increasingly requires the disclosure of personal user data. While these data represent an important value for service prov...
Jan Kolter, Günther Pernul
ICTAI
2009
IEEE
14 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu