Sciweavers

1028 search results - page 155 / 206
» Using Attack Graphs to Design Systems
Sort
View
SEMWEB
2005
Springer
14 years 2 months ago
A Strategy for Automated Meaning Negotiation in Distributed Information Retrieval
The paper reports on the formal framework to design strategies for multi-issue non-symmetric meaning negotiations among software agents in a distributed information retrieval syste...
Vadim Ermolayev, Natalya Keberle, Wolf-Ekkehard Ma...
ATAL
2004
Springer
14 years 2 months ago
Merging Globally Rigid Formations of Mobile Autonomous Agents
This paper is concerned with merging globally rigid formations of mobile autonomous agents. A key element in all future multi-agent systems will be the role of sensor and communic...
Tolga Eren, Brian D. O. Anderson, Walter Whiteley,...
ISWC
2003
IEEE
14 years 2 months ago
Unsupervised, Dynamic Identification of Physiological and Activity Context in Wearable Computing
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...
TPDS
2008
124views more  TPDS 2008»
13 years 8 months ago
Efficient Breadth-First Search on the Cell/BE Processor
Multicore processors are an architectural paradigm shift that promises a dramatic increase in performance. But, they also bring an unprecedented level of complexity in algorithmic ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
INFOCOM
2009
IEEE
14 years 3 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...