Sciweavers

3486 search results - page 528 / 698
» On the Design and Security of RC2
Sort
View
ATAL
2009
Springer
15 years 14 days ago
Towards an Architecture for Self-regulating Agents: A Case Study in International Trade
Abstract--Norm-enforcement models applied in human societies may serve as an inspiration for the design of multi-agent systems. Models for norm-enforcement in multi-agent systems o...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
AVSS
2008
IEEE
14 years 11 months ago
Multi-view Access Monitoring and Singularization in Interlocks
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...
80
Voted
CN
2010
100views more  CN 2010»
14 years 11 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
DSP
2010
14 years 11 months ago
A diffusion framework for detection of moving vehicles
Automatic acoustic-based vehicle detection is a common task in security and surveillance systems. Usually, a recording device is placed in a designated area and a hardware/softwar...
Alon Schclar, Amir Averbuch, N. Rabin, Valery A. Z...
ECR
2010
112views more  ECR 2010»
14 years 11 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen