Sciweavers

1216 search results - page 242 / 244
» Self-Protected Mobile Agents
Sort
View
ICS
2003
Tsinghua U.
14 years 3 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
CIKM
2001
Springer
14 years 2 months ago
Tempus Fugit: A System for Making Semantic Connections
Tempus Fugit (“Time Flies”) is the first of a new generation of Personal Information Management (PIM) systems. A PIM system incorporates an electronic calendar, “to-do” li...
Daniel Alexander Ford, Joann Ruvolo, Stefan Edlund...
KI
2001
Springer
14 years 2 months ago
Extracting Situation Facts from Activation Value Histories in Behavior-Based Robots
The paper presents a new technique for extracting symbolic ground facts out of the sensor data stream in autonomous robots for use under hybrid control architectures, which compris...
Frank Schönherr, Mihaela Cistelecan, Joachim ...
WOSP
2000
ACM
14 years 2 months ago
Expressing meaningful processing requirements among heterogeneous nodes in an active network
Active Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, nonhomogeneous processing can ...
Virginie Galtier, Kevin L. Mills, Yannick Carlinet...
DDEP
2000
Springer
14 years 2 months ago
Context-Aware Digital Documents Described in a High-Level Petri Net-Based Hypermedia System
As mobile computing becomes widespread, so will the need for digital document delivery by hypertextual means. A further trend will be the provision of the ability for devices to de...
Jin-Cheon Na, Richard Furuta