Sciweavers

178 search results - page 19 / 36
» Threat analysis and security architecture of mobile agent ba...
Sort
View
ISCIS
2004
Springer
14 years 1 months ago
Coordinating Distributed Autonomous Agents with a Real-Time Database: The CAMBADA Project
Interest on using mobile autonomous agents has been growing, recently, due to their capacity to cooperate for diverse purposes, from rescue to demining and security. However, such ...
Luís Almeida, Frederico Santos, Tullio Facc...
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 2 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...
CAISE
2003
Springer
14 years 1 months ago
Ontological Basis for Agent ADL
Abstract. Multi-Agent Systems (MAS) architectures are gaining popularity over traditional ones for building open, distributed or evolving software. To formally define system archit...
Stéphane Faulkner, Manuel Kolp
KESAMSTA
2009
Springer
14 years 17 days ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
CSE
2009
IEEE
14 years 2 months ago
Autonomous Management and Control of Sensor Network-Based Applications
—A central challenge facing sensor network research and development is the difficulty in providing effective autonomous management capability. This is due to a large number of p...
Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoof...