Sciweavers

686 search results - page 75 / 138
» Securing Mobile Agent Based Tele-Assistance Systems
Sort
View
HAIS
2008
Springer
15 years 29 days ago
Design Patterns for Combining Social and Individual Intelligences on Modular-Based Agents
Design patterns have been recently concerned in the multi-agent community for the design of systems with decentralized coordination. In this paper we present a design pattern for d...
Bianca Innocenti, Beatriz López, Joaquim Sa...
PADS
2000
ACM
15 years 4 months ago
Distributed, parallel simulation of multiple, deliberative agents
Multi-agent systems comprise multiple, deliberative agents embedded in and recreating patterns of interactions. Each agent’s execution consumes considerable storage and calculat...
Adelinde Uhrmacher, K. Gugler
DAIS
2003
15 years 1 months ago
Rational Server Selection for Mobile Agents
- Mobile agents have the ability to migrate through heterogeneous networks and execute at remote hosts. This ability can be exploited to improve the performance of agent based appl...
Carsten Pils, Stefan Diepolder
IACR
2011
137views more  IACR 2011»
13 years 11 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 6 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...