Sciweavers

250 search results - page 37 / 50
» On the Problem of Trust in Mobile Agent Systems
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
AAAI
2006
13 years 9 months ago
The Keystone Scavenger Team
Stereo vision for small mobile robots is a challenging problem, particularly when employing embedded systems with limited processing power. However, it holds the promise of greatl...
Jacky Baltes, John Anderson
IAT
2007
IEEE
14 years 1 months ago
Privacy Loss in Classical Multiagent Planning
Privacy is often cited as the main reason to adopt a multiagent approach for a certain problem. This also holds true for multiagent planning. Still, papers on multiagent planning ...
Roman van der Krogt
FSR
2003
Springer
251views Robotics» more  FSR 2003»
14 years 21 days ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...
EEMMAS
2007
Springer
14 years 1 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli