Sciweavers

315 search results - page 56 / 63
» Integrity of mobile agents: a new approach
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 6 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra
87
Voted
ANSS
2003
IEEE
15 years 5 months ago
Dissemination Scenarios in Peer-to-Peer Networks
As the average bandwidth capacity is increasing, users around the world demand for shorter service time. While the servers are able to acquire more bandwidth, they can not keep up...
Konstantinos G. Zerfiridis, Helen D. Karatza
94
Voted
FLAIRS
2006
15 years 1 months ago
Use of Dempster-Shafer Conflict Metric to Adapt Sensor Allocation to Unknown Environments
This paper considers a robot with multiple sensors navigating an unknown, heterogeneous environment. In these cases sensor errors may produce an unsuitable model of the world. For...
Jennifer Carlson, Robin R. Murphy
ECOOPW
1999
Springer
15 years 4 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
ICPP
2006
IEEE
15 years 5 months ago
Social Welfare Based Routing in Ad hoc Networks
— Due to resource scarcity, a paramount concern in ad hoc networks is to utilize the limited resources efficiently. The self-organized nature of ad hoc networks makes the social...
Mingming Lu, Jie Wu