Sciweavers

315 search results - page 29 / 63
» Integrity of mobile agents: a new approach
Sort
View
ICSE
1999
IEEE-ACM
15 years 4 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
ATAL
2006
Springer
15 years 3 months ago
Learnable behavioural model for autonomous virtual agents: low-level learning
In this paper, we propose a new integration approach for simulation and behaviour in the learning context that is able to coherently manage the shared virtual environment for the ...
Toni Conde, Daniel Thalmann
JPDC
2006
141views more  JPDC 2006»
14 years 11 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
ATAL
2007
Springer
15 years 6 months ago
Scaling-up shopbots: a dynamic allocation-based approach
In this paper we consider the problem of eCommerce comparison shopping agents (shopbots) that are limited by capacity constraints. In light of the phenomenal increase both in dema...
David Sarne, Sarit Kraus, Takayuki Ito
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 6 months ago
Sufficient conditions for flocking via graph robustness analysis
In this paper, we consider a multi-agent system consisting of mobile agents with second-order dynamics. The communication network is determined by a standard interaction rule based...
Samuel Martin, Antoine Girard