Sciweavers

422 search results - page 3 / 85
» On Exploiting Agent Technology in the Design of Peer-to-Peer...
Sort
View
VRCAI
2006
ACM
14 years 1 months ago
Advanced virtual reality technologies for surveillance and security applications
We present a system that exploits advanced Virtual Reality technologies to create a surveillance and security system. Surveillance cameras are carried by a mini Blimp which is tel...
Renaud Ott, Mario Gutiérrez, Daniel Thalman...
WWW
2004
ACM
14 years 8 months ago
Exploiting conceptual modeling for web application quality evaluation
This paper presents an approach and a toolset for exploiting the benefits of conceptual modeling in the quality evaluation tasks that take place both before the deployment and dur...
Piero Fraternali, Pier Luca Lanzi, Maristella Mate...
ISADS
2003
IEEE
14 years 21 days ago
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
Maintaining mobile agent availability in the presence of agent server crashes is a challenging issue since developers normally have no control over remote agent servers. A popular...
Simon Pears, Jie Xu, Cornelia Boldyreff
CATA
2003
13 years 8 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
WWW
2005
ACM
14 years 8 months ago
Migrating web application sessions in mobile computing
The capability to change user agent while working is starting to appear in state of the art mobile computing due to the proliferation of different kinds of devices, ranging from p...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...