Sciweavers

981 search results - page 105 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
IPM
2007
139views more  IPM 2007»
15 years 1 months ago
A semantic Bayesian network approach to retrieving information with intelligent conversational agents
As access to information becomes more intensive in society, a great deal of that information is becoming available through diverse channels. Accordingly, users require effective ...
Kyoung Min Kim, Jin-Hyuk Hong, Sung-Bae Cho
WIMOB
2007
IEEE
15 years 7 months ago
A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks
—The low-cost, unattended nature and the capability of self-organizing of sensors, yield the use of Wireless Sensor Networks (WSN) very popular to day. Unfortunately, the unshiel...
Chakib Bekara, Maryline Laurent-Maknavicius
ACISICIS
2010
IEEE
15 years 3 months ago
New Interface Using Palm and Fingertip without Marker for Ubiquitous Environment
We developed new interactive display system called the palm display. Our prototype system shows the image of graphical user interface on the palm and allows the user to have intera...
Seokhwan Kim, Shin Takahashi, Jiro Tanaka
ATAL
2003
Springer
15 years 6 months ago
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads
To increase the assurance with which agents can be deployed in operational settings, we have been developing the KAoS policy and domain services. In conjunction with Nomads strong...
Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers,...
SACMAT
2009
ACM
15 years 8 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger