Sciweavers

2699 search results - page 415 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
AGENTS
2000
Springer
14 years 1 months ago
Ant-like missionaries and cannibals: synthetic pheromones for distributed motion control
Many applied problems in domains such as military operations, manufacturing, and logistics require that entities change location under certain constraints. These problems are trad...
H. Van Dyke Parunak, Sven Brueckner
AGENTS
1998
Springer
14 years 1 months ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 29 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
FTDCS
2004
IEEE
14 years 24 days ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...
ADHOC
2008
132views more  ADHOC 2008»
13 years 9 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao