Sciweavers

762 search results - page 84 / 153
» Security Contexts in Autonomic Systems
Sort
View
INFOCOM
2009
IEEE
14 years 4 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
IRI
2006
IEEE
14 years 4 months ago
Environment as support for simplification, reuse and integration of processes in spatial MAS
The development of solutions to complex problems requires finding answers to several questions which are obstacles on the road leading to the solution. To perpetuate progress, the...
Denis Payet, Rémy Courdier, Nicolas S&eacut...
ATAL
2003
Springer
14 years 3 months ago
Dimensions of Adjustable Autonomy and Mixed-Initiative Interaction
Abstract. Several research groups have grappled with the problem of characterizing and developing practical approaches for implementing adjustable autonomy and mixed-initiative int...
Jeffrey M. Bradshaw, Paul J. Feltovich, Hyuckchul ...
IACR
2011
129views more  IACR 2011»
12 years 9 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
ETFA
2008
IEEE
13 years 10 months ago
Self-configuration of an adaptive TDMA wireless communication protocol for teams of mobile robots
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such...
Frederico Santos, Luís Almeida, Luís...