Sciweavers

2024 search results - page 351 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
IADIS
2003
15 years 5 months ago
Computing Migration Through Context Awareness and Context Transmission
With the development of wireless communication and portable devices, people can now enjoy the benefits of mobile computing. But due to the nature and design of portable devices, i...
Zhaohui Cheng, Kenneth Chin, Yuan Luo
WSC
2001
15 years 5 months ago
Simulation data exchange (SDX) implementation and use
Facility layouts of existing or proposed production systems often form the basis of a dynamic simulation study to prove the design concept and to determine if the required through...
David P. Sly, Shreekanth Moorthy
BCEC
1997
15 years 5 months ago
Adaptive Task Allocation Inspired by a Model of Division of Labor in Social Insects
Social insects provide us with a powerful metaphor to create decentralized systems of simple interacting, and often mobile, agents. The emergent collective intelligence of social i...
Eric Bonabeau, Andrej Sobkowski, Guy Theraulaz, Je...
CN
2007
179views more  CN 2007»
15 years 4 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ICANN
2003
Springer
15 years 9 months ago
An Adaptable Gaussian Neuro-Fuzzy Classifier
The concept of semantic and context aware intelligent systems provides a vision for the Information Society where the emphasis lays on computing applications that can sense context...
Minas Pertselakis, Dimitrios S. Frossyniotis, Andr...