Sciweavers

569 search results - page 87 / 114
» A Mobile Agent Infrastructure for the Mobility Support
Sort
View
RE
2002
Springer
14 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
AAAI
1990
14 years 11 months ago
Integrating, Execution, Planning, and Learning in Soar for External Environments
Three key components of an autonomous intelligent system are planning, execution, and learning. This paper describes how the Soar architecture supports planning, execution, and le...
John E. Laird, Paul S. Rosenbloom
INFOCOM
2000
IEEE
15 years 2 months ago
A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols
Abstract—In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the...
Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, ...
WMI
2001
114views more  WMI 2001»
14 years 11 months ago
A high capacity multihop packet CDMA wireless network
: An adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Ali Nabi Zadeh, Bijan Jabbari
PERCOM
2005
ACM
15 years 9 months ago
REDMAN: A Decentralized Middleware Solution for Cooperative Replication in Dense MANETs
The mass market of wireless devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, such as university campuses,...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...