Sciweavers

3047 search results - page 89 / 610
» A Secure Distributed Search System
Sort
View
SOCIALCOM
2010
15 years 27 days ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 7 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
IUI
2010
ACM
15 years 8 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 7 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
AGENTS
1999
Springer
15 years 7 months ago
Top-Down Search for Coordinating the Hierarchical Plans of Multiple Agents
Uncertain and complex environments demand that an agent be able to anticipate the actions of others in order to avoid resource conflicts with them and to realize its goals. Confli...
Bradley J. Clement, Edmund H. Durfee