Sciweavers

981 search results - page 42 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
WISEC
2010
ACM
15 years 1 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
IWUC
2004
15 years 2 months ago
Ubiquitous Application Development using a Mobile Agent-based System
Abstract. This study proposes a methodology that allows the flexible and maintainable development of application based on mobile agent to a ubiquitous environment. Ubiquitous envir...
Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Ho...
SAC
2006
ACM
15 years 7 months ago
A chat interface for human-agent interaction in MAST
In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our...
Marco M. Carvalho, Matteo Rebeschini, James Horsle...
ISDA
2005
IEEE
15 years 7 months ago
Managing of Cooperative Genetic Algorithms by Intelligent Agent
Genetic Algorithms (GAs) are very popular optimization tool, although efficient applications of GAs requires users have problem with setting their parameters and used genetic ope...
Halina Kwasnicka, Magdalena Gierusz
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 5 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...