Sciweavers

PAAMS
2010
Springer
13 years 9 months ago
Detection of Overworked Agents in INGENIAS
Celia Gutiérrez, Iván García-...
PAAMS
2010
Springer
13 years 9 months ago
Comparing Three Computational Models of Affect
In aiming for behavioral fidelity, artificial intelligence cannot and no longer ignores the formalization of human affect. Affect modeling plays a vital role in faithfully simulati...
Tibor Bosse, Jonathan Gratch, Johan F. Hoorn, Matt...
KESAMSTA
2010
Springer
13 years 9 months ago
Symmetry Approach to Evacuation Scenarios
The first trial of using the symmetry analysis method in modeling of behavior of complex social system is presented in this work. The evacuation of large building scenarios are d...
Wieslawa Sikora, Janusz Malinowski
KESAMSTA
2010
Springer
13 years 9 months ago
Classifying Agent Behaviour through Relational Sequential Patterns
Abstract. In Multi-Agent System, observing other agents and modelling their behaviour represents an essential task: agents must be able to quickly adapt to the environment and infe...
Grazia Bombini, Nicola Di Mauro, Stefano Ferilli, ...
WETICE
2002
IEEE
13 years 9 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler
WETICE
2002
IEEE
13 years 9 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
WETICE
2002
IEEE
13 years 9 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
WETICE
2002
IEEE
13 years 9 months ago
Intrusion Detection: Systems and Models
Joseph S. Sherif, Tommy G. Dearmond
WETICE
2002
IEEE
13 years 9 months ago
Analysis of an Anonymity Network for Web Browsing
Various systems offering anonymity for near real-time Internet traffic have been operational. However, they did not deliver many quantitative results about performance, bandwidth...
Marc Rennhard, Sandro Rafaeli, Laurent Mathy, Bern...
WETICE
2002
IEEE
13 years 9 months ago
A Mobile Agent Clone Detection System with Itinerary Privacy
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
T. C. Lam, Victor K. Wei