Sciweavers

2704 search results - page 529 / 541
» Agent Development with Jackal
Sort
View
IJDSN
2006
132views more  IJDSN 2006»
14 years 11 months ago
Using Misbehavior to Analyze Strategic versus Aggregate Energy Minimization in Wireless Sensor Networks
Abstract-- We present a novel formulation of the problem of energy misbehavior and develop an analytical framework for quantifying its impact on other nodes. Specifically, we formu...
Rajgopal Kannan, Shuangqing Wei, Vasu Chakravarthy...
DAC
2008
ACM
16 years 21 days ago
ADAM: run-time agent-based distributed application mapping for on-chip communication
Design-time decisions can often only cover certain scenarios and fail in efficiency when hard-to-predict system scenarios occur. This drives the development of run-time adaptive s...
Jörg Henkel, Mohammad Abdullah Al Faruque, Ru...
WWW
2008
ACM
16 years 11 days ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
CSE
2009
IEEE
15 years 6 months ago
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications
Ubiquitous and pervasive applications are aware of the context of the used resources. This class of application can benefit from mechanisms to discover resources (devices and sens...
André Luiz B. Rodrigues, Izabela C. Gomes, ...
TRUST
2009
Springer
15 years 6 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi