Sciweavers

981 search results - page 115 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
118
Voted
SOCO
2008
Springer
15 years 1 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ADHOCNETS
2009
Springer
15 years 6 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
224
Voted
AGENTS
2001
Springer
15 years 6 months ago
Adjustable autonomy in real-world multi-agent environments
Through adjustable autonomy (AA), an agent can dynamically vary the degree to which it acts autonomously, allowing it to exploit human abilities to improve its performance, but wi...
Paul Scerri, David V. Pynadath, Milind Tambe
MDM
2007
Springer
123views Communications» more  MDM 2007»
15 years 7 months ago
Group Anti-Entropy - Achieving Eventual Consistency in Mobile Service Environments
Data consistency protocols are vital ingredients of mobile data management systems. Notable research efforts have been spent to find adequate consistency models for allowing mobi...
Klaus Herrmann
AAAI
2010
15 years 3 months ago
Activity and Gait Recognition with Time-Delay Embeddings
Activity recognition based on data from mobile wearable devices is becoming an important application area for machine learning. We propose a novel approach based on a combination ...
Jordan Frank, Shie Mannor, Doina Precup