Sciweavers

212 search results - page 33 / 43
» A Reverse Engineering Form for Multi Agent Systems
Sort
View
ACSC
2006
IEEE
15 years 3 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
ICCSA
2010
Springer
15 years 2 months ago
Geospatial Analysis of Cooperative Works on Asymmetric Information Environment
In the so-called Information-Explosion Era, astronomical amount of information is ubiquitously produced and digitally stored. It is getting more and more convenient for cooperative...
Tetsuya Kusuda, Tetsuro Ogi
CORR
2010
Springer
197views Education» more  CORR 2010»
14 years 8 months ago
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
—Autonomous wireless agents such as unmanned aerial vehicles, mobile base stations, or self-operating wireless nodes present a great potential for deployment in next-generation w...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
ATAL
2006
Springer
15 years 1 months ago
Web presentation system using RST events
Constructing presentations as stories is about presenting events that receive their relevance and meaning within the context of the presentation, and about means to define a well-...
Arturo Nakasone, Helmut Prendinger, Mitsuru Ishizu...
CCIA
2009
Springer
14 years 10 months ago
Shout and Act
1 We adapt the Shout and Act algorithm to Digital Objects Preservation where agents explore file systems looking for digital objects to be preserved (victims). When they find somet...
Josep Lluís de la Rosa, Albert Trias i Mans...