Sciweavers

981 search results - page 32 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ICSNC
2007
IEEE
15 years 7 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ICDCSW
2002
IEEE
15 years 6 months ago
Autonomous and Asynchronous Operation of Networked Appliances with Mobile Agent
This paper describes the Smart Operation of Networked Appliances (SONA) system which realizes the autonomous and asynchronous operation of networked appliances by using mobile age...
Soko Aoki, Jin Nakazawa, Hideyuki Tokuda
CCGRID
2001
IEEE
15 years 5 months ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
ATAL
2011
Springer
14 years 1 months ago
AgentC: agent-based system for securing maritime transit
Recent rise in maritime piracy prompts the search for novel techniques for addressing the problem. We therefore developed AgentC, a prototype system that demonstrates how agent-ba...
Michal Jakob, Ondrej Vanek, Branislav Bosansk&yacu...
IEAAIE
2003
Springer
15 years 6 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson