Sciweavers

2808 search results - page 78 / 562
» Mobile Agent Security
Sort
View
ADMI
2010
Springer
15 years 7 months ago
Probabilistic Modeling of Mobile Agents' Trajectories
Abstract. We present a method for learning characteristic motion patterns of mobile agents. The method works on two levels. On the first level, it uses the expectation-maximization...
Stepán Urban, Michal Jakob, Michal Pechouce...
ICS
2003
Tsinghua U.
15 years 10 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
DIGITEL
2007
IEEE
15 years 11 months ago
Pedagogical Agents for Teacher Intervention in Educational Robotics Classes: Implementation Issues
Teachers working in robotics classes face a major problem: how to keep track on individual students’ or even small groups’ progress in a class of 30-40 students. A multi-agent...
Ilkka Jormanainen, Yuejun Zhang, Kinshuk, Erkki Su...
AAAI
2004
15 years 6 months ago
Visibility-Based Pursuit-Evasion with Limited Field of View
We study a form of the pursuit-evasion problem, in which one or more searchers must move through a given environment so as to guarantee detection of any and all evaders, which can...
Brian P. Gerkey, Sebastian Thrun, Geoffrey J. Gord...
MA
2000
Springer
116views Communications» more  MA 2000»
15 years 9 months ago
Strong Mobility and Fine-Grained Resource Control in NOMADS
NOMADS is a Java-based agent system that supports strong mobility (i.e., the ability to capture and transfer the full execution state of migrating agents) and safe agent execution ...
Niranjan Suri, Jeffrey M. Bradshaw, Maggie R. Bree...