Sciweavers

8080 search results - page 61 / 1616
» From Computer Networks to Agent Networks
Sort
View
APNOMS
2009
Springer
15 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
NOMS
2000
IEEE
15 years 2 months ago
Failure semantics of mobile agent systems involved in network fault management
Recently mobile agent technology has been recognised as a potential tool for realising distributed network fault management. The autonomy and mobility of such agents can help ensu...
Otto Wittner, Bjarne E. Helvik, C. J. E. Holper
BIRD
2008
Springer
158views Bioinformatics» more  BIRD 2008»
14 years 11 months ago
A Computational Method for Reconstructing Gapless Metabolic Networks
Abstract. We propose a computational method for reconstructing metabolic networks. The method utilizes optimization techniques and graph traversal algorithms to discover a set of b...
Esa Pitkänen, Ari Rantanen, Juho Rousu, Esko ...
ATAL
2003
Springer
15 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
WIMOB
2008
IEEE
15 years 4 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...