Sciweavers

135 search results - page 22 / 27
» One-Round Secure Computation and Secure Autonomous Mobile Ag...
Sort
View
WICOMM
2008
258views more  WICOMM 2008»
13 years 6 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
13 years 8 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
ISSA
2004
13 years 8 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ATAL
2004
Springer
13 years 10 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ATAL
2005
Springer
14 years 7 days ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards