Sciweavers

25 search results - page 3 / 5
» Defense and homeland security applications of multi-agent si...
Sort
View
DGO
2007
192views Education» more  DGO 2007»
13 years 7 months ago
D-HOTM: distributed higher order text mining
We present D-HOTM, a framework for Distributed Higher Order Text Mining based on named entities extracted from textual data that are stored in distributed relational databases. Unl...
William M. Pottenger
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
14 years 8 days ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
CRITIS
2007
13 years 7 months ago
LoRDAS: A Low-Rate DoS Attack against Application Servers
In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Gabriel Maciá-Fernández, Jesú...
IJWIS
2007
153views more  IJWIS 2007»
13 years 6 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
TMC
2011
164views more  TMC 2011»
13 years 1 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger