Sciweavers

1519 search results - page 47 / 304
» Authentication for Mobile Agents
Sort
View
APIN
2006
90views more  APIN 2006»
14 years 12 months ago
AgentTeamwork: Coordinating grid-computing jobs with mobile agents
AgentTeamwork is a grid-computing middleware system that dispatches a collection of mobile agents to coordinate a user job over remote computing nodes in a decentralized manner. I...
Munehiro Fukuda, Koichi Kashiwagi, Shin-ya Kobayas...
HPCN
2000
Springer
15 years 3 months ago
Ruling Agent Motion in Structured Environments
The design and development of cooperative Internet applications based on mobile agents require appropriate modelling of both the physical space where agents roam and the conceptual...
Marco Cremonini, Andrea Omicini, Franco Zambonelli
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 6 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
ENTCS
2007
94views more  ENTCS 2007»
14 years 11 months ago
A Distributed Implementation of Mobile Maude
We present a new specification/implementation of the mobile agent language Mobile Maude. This new version uses the external sockets provided by Maude since its 2.2 version, thus ...
Francisco Durán, Adrián Riesco, Albe...
HUC
2007
Springer
15 years 6 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas