Sciweavers

2808 search results - page 519 / 562
» Mobile Agent Security
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 11 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
14 years 11 months ago
PeerDB: A P2P-based System for Distributed Data Sharing
In this paper, we present the design and evaluation of PeerDB, a peer-to-peer (P2P) distributed data sharing system. PeerDB distinguishes itself from existing P2P systems in sever...
Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying ...
SAC
2010
ACM
14 years 4 months ago
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning
This article addresses the problem of efficient multi-robot patrolling in a known environment. The proposed approach assigns regions to each mobile agent. Every region is represen...
David Portugal, Rui Rocha
ICCSA
2009
Springer
14 years 4 months ago
A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problems...
Jin Wang, Sungyoung Lee
INTETAIN
2009
Springer
14 years 4 months ago
Accessible Gaming through Mainstreaming Kinetic Controller
Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be...
Yolanda Garrido, Álvaro Marco, Joaquí...