Sciweavers

984 search results - page 162 / 197
» The Use of Software Agents as Proxies
Sort
View
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
14 years 11 days ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
WSC
2007
13 years 10 months ago
ExtendSim 7
ExtendSim 7 is a proven simulation environment capable of modeling a wide range of systems. ExtendSim 7 is used to model continuous, discrete event, discrete rate, and agent based...
David Krahl
WSC
2007
13 years 10 months ago
Modeling bioterrorism preparedness with simulation in rural healthcare system
As a result of the anthrax letter incidents in 2001, concerns about terrorists’ use of biological agents have increased dramatically at government state and federal levels. The ...
Lisa Patvivatsiri, Elliot J. Montes Jr., Ouyang Xi
OWLED
2007
13 years 10 months ago
Ontology-Based Management of the Telehealth Smart Home, Dedicated to Elderly in Loss of Cognitive Autonomy
Taking care of an elderly in loss of cognitive autonomy is a challenging task. Artificial agents, such as the Telehealth Smart Home (TSH) system can facilitate that task. However,...
Fatiha Latfi, Bernard Lefebvre, Céline Desc...
CSFW
2008
IEEE
14 years 3 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang