Sciweavers

981 search results - page 33 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ISSRE
2010
IEEE
14 years 12 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 1 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham
ISEM
2008
129views more  ISEM 2008»
15 years 1 months ago
User requirements of mobile technology: results from a content analysis of user reviews
Advanced mobile technology continues to shape professional environments. Smart cell phones, pocket computers and laptop computers reduce the need of users to remain close to a wir...
Judith Gebauer, Ya Tang, Chaiwat Baimai
MAGS
2008
169views more  MAGS 2008»
15 years 1 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
IJNSEC
2007
144views more  IJNSEC 2007»
15 years 1 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh