In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
RHex is a hexapod with compliant legs and only six actuated degrees of freedom. Its ability to traverse highly fractured and unstable terrain, as well ascend and descend a particu...
E. Z. Moore, D. Campbell, Felix Grimminger, Martin...
The emergence of Application Service Providers (ASP) hosting Internet-based data mining services is being seen as a viable alternative for organisations that value their knowledge...
Shonali Krishnaswamy, E. P. See, J. N. Ho, W. Guna...
Mobile application components can be effectively and uniformly modeled in terms of autonomous agents moving across different context during execution. In this paper, we introduce a...
Giacomo Cabri, Letizia Leonardi, Marco Mamei, Fran...
Machine-understandable metadata is providing the foundation for next-generationframeworks that enable automated construction ofserver-side Java applications. Suchapplications are ...