Sciweavers

304 search results - page 27 / 61
» Trusted Computing in Mobile Action
Sort
View
AI
1999
Springer
13 years 7 months ago
Cooperative Behavior Acquisition for Mobile Robots in Dynamically Changing Real Worlds Via Vision-Based Reinforcement Learning a
In this paper, we first discuss the meaning of physical embodiment and the complexity of the environment in the context of multi-agent learning. We then propose a vision-based rei...
Minoru Asada, Eiji Uchibe, Koh Hosoda
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ICDCS
2002
IEEE
14 years 19 days ago
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
Distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and accesscontrol mechanism for systems that span multiple administrative domains. dRBA...
Eric Freudenthal, Tracy Pesin, Lawrence Port, Edwa...
ICPPW
1999
IEEE
13 years 12 months ago
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol
We deal with two claws of Zhou-Gollmann's fair nonrepudiation protocol. Firstly, their protocol divides a message into 2 parts, i.e., a key K and a ciphertext C. Then, C is d...
Kwangjo Kim, Sangjoon Park, Joonsang Baek
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 29 days ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre