Sciweavers

127 search results - page 23 / 26
» Addressing Mobile Agent Security through Agent Collaboration
Sort
View
AAAI
2004
13 years 6 months ago
Visibility-Based Pursuit-Evasion with Limited Field of View
We study a form of the pursuit-evasion problem, in which one or more searchers must move through a given environment so as to guarantee detection of any and all evaders, which can...
Brian P. Gerkey, Sebastian Thrun, Geoffrey J. Gord...
SC
2005
ACM
13 years 10 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...
POLICY
2004
Springer
13 years 10 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
IAT
2009
IEEE
13 years 12 months ago
Group Recommendation with Automatic Identification of Users Communities
—Recommender systems usually propose items to single users. However, in some domains like Mobile IPTV or Satellite Systems it might be impossible to generate a program schedule f...
Ludovico Boratto, Salvatore Carta, Alessandro Ches...
ECOOPW
1999
Springer
13 years 9 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis