Sciweavers

222 search results - page 31 / 45
» An Aspect-Oriented Approach to Mobile Agent Access Control
Sort
View
ESORICS
2000
Springer
15 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
MOBICOM
2004
ACM
15 years 3 months ago
Vehicle-to-vehicle safety messaging in DSRC
— This paper studies the design of layer-2 protocols for a vehicle to send safety messages to other vehicles. The target is to send vehicle safety messages with high reliability ...
Qing Xu 0007, Tony K. Mak, Jeff Ko, Raja Sengupta
JSAC
2007
180views more  JSAC 2007»
14 years 9 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
AAAI
2011
13 years 9 months ago
A Switching Planner for Combined Task and Observation Planning
From an automated planning perspective the problem of practical mobile robot control in realistic environments poses many important and contrary challenges. On the one hand, the p...
Moritz Göbelbecker, Charles Gretton, Richard ...
CORR
2011
Springer
217views Education» more  CORR 2011»
14 years 1 months ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins