Sciweavers

388 search results - page 41 / 78
» Promoting the development of secure mobile agent application...
Sort
View
AOSE
2004
Springer
14 years 2 months ago
An Agent Construction Model for Ubiquitous Computing Devices
Abstract. One of the main challenges for the successful application of agentbased systems in mobile and embedded devices is enabling application developers to reconcile the needs o...
Ronald Ashri, Michael Luck
IASTEDSE
2004
13 years 10 months ago
Mobile, on demand access of service-annotated 3D maps
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
AAAI
2011
12 years 8 months ago
A Switching Planner for Combined Task and Observation Planning
From an automated planning perspective the problem of practical mobile robot control in realistic environments poses many important and contrary challenges. On the one hand, the p...
Moritz Göbelbecker, Charles Gretton, Richard ...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 1 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
POPL
2001
ACM
14 years 9 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi