Sciweavers

8080 search results - page 375 / 1616
» From Computer Networks to Agent Networks
Sort
View
IJNSEC
2007
108views more  IJNSEC 2007»
15 years 4 months ago
Mobility Management with Distributed AAA Architecture
Mobile IP has been defined by Third Generation Partnership Project 2(3GPP2) to be the mobility solution for the next generation cellular networks. The Mobile IP related issues th...
Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting ...
IJCIA
2002
137views more  IJCIA 2002»
15 years 4 months ago
Co-Evolution in Social Interactions
An interesting problem which has been widely investigated is under what circumstances will a society of rational agents realize some particular stable situations, and whether they ...
Hiroshi Sato, Akira Namatame
RE
2002
Springer
15 years 4 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
PEWASUN
2006
ACM
15 years 10 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
GI
2008
Springer
15 years 5 months ago
Authenticity: The missing link in the social semantic web
Abstract: Especially data on social network services (SNS) is linked to online personas. Our analysis has shown that no reliably solution for origin authentication is in widespread...
Bastian Braun, Henrich Christopher Pöhls