Sciweavers

762 search results - page 38 / 153
» Modeling and Simulating Information Security Management
Sort
View
WAIM
2005
Springer
14 years 1 months ago
Simulating a Finite State Mobile Agent System
This paper analyzes the simulation of Finite State mobile agent, which regards the migration, execution, and searching of the mobile agents as finite states. As the finite state mo...
Yong Liu, Congfu Xu, Yanyu Chen, Yunhe Pan
KES
2000
Springer
13 years 11 months ago
On AIE-ASM: a software to simulate artificial stock markets with genetic programming
Agent-based computational economic modeling requires demanding work on computer programming. Usually, the publications as outcomes of running these programs do not provide readers ...
Shu-Heng Chen, Chung-Chih Liao, Chia-Hsuan Yeh
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
WSC
2007
13 years 10 months ago
Upgraded cellular automata based group-work interaction simulation
The simulation of group-work interaction is significant for Chinese enterprise organizational management. As a result, a cellular-automata based simulation model is put forward. T...
Dong Shengping, Hu Bin