Sciweavers

981 search results - page 59 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
NETWORKS
2008
15 years 1 months ago
Decontamination of hypercubes by mobile agents
In this paper we consider the decontamination problem in a hypercube network of size n. The nodes of the network are assumed to be contaminated and they have to be decontaminated ...
Paola Flocchini, Miao Jun Huang, Flaminia L. Lucci...
WMCSA
2008
IEEE
15 years 7 months ago
Making CAPTCHAs clickable
We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minim...
Richard Chow, Philippe Golle, Markus Jakobsson, Lu...
COOPIS
1997
IEEE
15 years 5 months ago
Task Sharing among Agents using Reactive Rules
Coordination and collaboration are naturally used by groups for carrying out activities and solving problems that require cooperation. However, getting a set of computer agents to...
Mikael Berndtsson, Sharma Chakravarthy, Brian Ling...
PERCOM
2003
ACM
16 years 1 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
CIA
1999
Springer
15 years 5 months ago
Mobile-Agent Mediated Place Oriented Communication
When we communicate with others in a most primitive way like face-to-face conversation, we normally gather at a common physical place. This physical constraint has been recognized ...
Yasuhiko Kitamura, Yasuhiro Mawarimichi, Shoji Tat...