Sciweavers

981 search results - page 29 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 1 months ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
AISADM
2005
Springer
15 years 7 months ago
An Architecture for Distributed Agent-Based Data Preprocessing
Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
ISN
2000
Springer
120views Communications» more  ISN 2000»
15 years 5 months ago
Providing Customisable Network Management Services Through Mobile Agents
Telecommunications network management has attracted a lot of attention in terms of research and standardisation in the last decade. TMN and TINA architectural frameworks try to add...
David Griffin, George Pavlou, Panos Georgatsos
DSOM
2000
Springer
15 years 5 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
AGENTS
2001
Springer
15 years 6 months ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...