Sciweavers

255 search results - page 14 / 51
» The Reconstruction of a Mobile Agent Computation and Its Val...
Sort
View
ACMSE
2004
ACM
14 years 25 days ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
ICPP
2003
IEEE
14 years 20 days ago
Implementation of Strong Mobility for Multi-Threaded Agents in Java
Strong mobility, which allows an external thread to transparently migrate an agent at any time, is difficult to implement in Java since the Java Virtual Machine does not allow se...
Arjav J. Chakravarti, Xiaojin Wang, Jason O. Halls...
ICCS
2004
Springer
14 years 23 days ago
Agent-Based Simulation of Data-Driven Fire Propagation Dynamics
Real world problems such as fire propagation prediction, can often be considered as a compositional combination of multiple, simple but coupled subproblems corresponding to analyt...
John Michopoulos, Panagiota Tsompanopoulou, Elias ...
ECCV
1998
Springer
13 years 11 months ago
Stereo Vision-Based Navigation in Unknown Indoor Environment
Different applications in the field of vision-based navigation of autonomous mobile robots depend on the degree of knowledge of the environment. Indoor environment applications oft...
Oliver Schreer
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee