Sciweavers

1532 search results - page 245 / 307
» Embodied mobile agents
Sort
View
SIGOPS
2002
69views more  SIGOPS 2002»
14 years 11 months ago
On the value of threshold signatures
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
CIA
2007
Springer
15 years 6 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek
IPPS
2005
IEEE
15 years 5 months ago
A Powerful Direct Mechanism for Optimal WWW Content Replication
This paper addresses the problem of fine-grained data replication in large distributed systems, such as the Internet, so as to minimize the user access delays. With fine-grained d...
Samee Ullah Khan, Ishfaq Ahmad
CEEMAS
2003
Springer
15 years 5 months ago
Communication Security in Multi-agent Systems
Both, research and application development in the area of multi-agent systems currently undertakes rapid expansion. In order to use multi-agent technology in real applications, it ...
Petr Novák, Milan Rollo, Jirí Hod&ia...
FLAIRS
2001
15 years 1 months ago
A Multimodal Shopping Assistant for Home E-Commerce
Electronic Commerce has rapidly grown with the expansion of the Internet. E-commerce has also become a promising field for applying agent and Artificial Intelligence technologies....
Mehrdad Jalali-Sohi, Feza Baskaya