Sciweavers

Share
25 search results - page 1 / 5
» ieeeia 2009
Sort
View
IEEEIA
2009
9 years 11 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
IEEEIA
2009
9 years 11 months ago
Agent Based Multipath Routing in Wireless Sensor Networks
recently, mobile agents have been used to solve many problems in wireless sensor networks. Agents are usually transferred from a node to another to aggregate the sensed data and si...
Rabie A. Ramadan
IEEEIA
2009
9 years 11 months ago
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning a...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...
IEEEIAS
2009
IEEE
9 years 11 months ago
A Study on the Algorithm Based on Image Color Correlation Mining
: Because of the semantic gap between low-level feature and high-level semantic feature of images, the results of the traditional color-based image retrieval can't meet users&...
Yongyue Chen, Huosong Xia
IEEEIAS
2009
IEEE
10 years 8 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
books