Sciweavers

81 search results - page 15 / 17
» A P2P intrusion detection system based on mobile agents
Sort
View
ISSTA
2009
ACM
13 years 10 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
AAAI
2006
13 years 6 months ago
A Manifold Regularization Approach to Calibration Reduction for Sensor-Network Based Tracking
The ability to accurately detect the location of a mobile node in a sensor network is important for many artificial intelligence (AI) tasks that range from robotics to context-awa...
Jeffrey Junfeng Pan, Qiang Yang, Hong Chang, Dit-Y...
COMSIS
2007
80views more  COMSIS 2007»
13 years 5 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
CONCUR
2000
Springer
13 years 9 months ago
Typed Mobile Objects
We describe a general model for embedding object-oriented constructs into calculi of mobile agents. The model results from extending agents with methods and primitives for message ...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
ICEIS
2005
IEEE
13 years 11 months ago
Change Detection and Maintenance of an XML Web Warehouse
The World Wide Web contains a huge and increasing volume of information. The web warehouse is an efficient and effective means to facilitate utilization of information on the Web,...
Ching-Ming Chao