Sciweavers

897 search results - page 170 / 180
» Protecting Information Sharing in Distributed Collaborative ...
Sort
View
AAAI
1998
13 years 9 months ago
What Is Wrong With Us? Improving Robustness Through Social Diagnosis
1 Robust behavior in complex, dynamic environments mandates that intelligent agents autonomously monitor their own run-time behavior, detect and diagnose failures, and attempt reco...
Gal A. Kaminka, Milind Tambe
ICS
2003
Tsinghua U.
14 years 23 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
SASN
2006
ACM
14 years 1 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...
MOBIHOC
2003
ACM
14 years 7 months ago
Lightweight sensing and communication protocols for target enumeration and aggregation
The development of lightweight sensing and communication protocols is a key requirement for designing resource constrained sensor networks. This paper introduces a set of efficien...
Qing Fang, Feng Zhao, Leonidas J. Guibas
ESWS
2008
Springer
13 years 9 months ago
A Semantic Web Middleware for Virtual Data Integration on the Web
In this contribution a system is presented, which provides access to distributed data sources using Semantic Web technology. While it was primarily designed for data sharing and sc...
Andreas Langegger, Wolfram Wöß, Martin ...