Sciweavers

1600 search results - page 265 / 320
» Problem-solving in open environments
Sort
View
USS
2008
13 years 10 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
CCIA
2008
Springer
13 years 9 months ago
Probabilistic Dynamic Belief Logic for Image and Reputation
Since electronic and open environments became a reality, computational trust and reputation models have attracted increasing interest in the field of multiagent systems (MAS). Some...
Isaac Pinyol, Jordi Sabater-Mir, Pilar Dellunde
CCS
2008
ACM
13 years 9 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
COMSWARE
2008
IEEE
13 years 9 months ago
Density-first Ad-hoc routing protocol for MANET
In recent years, Mobile Ad-hoc Networks (MANETs) have received tremendous attention because of their self-configuration and self-maintenance capabilities. With open network archite...
Jiong Wang, Sirisha Medidi
ECAI
2008
Springer
13 years 9 months ago
Can URML Model Successfully Drools Rules?
The use of rules in business modeling is becoming more and more important, in applications requiring dynamic change of behavior. A number of rule languages and tools have been prop...
Emilian Pascalau, Adrian Giurca