Sciweavers

981 search results - page 64 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
DATE
2010
IEEE
134views Hardware» more  DATE 2010»
15 years 6 months ago
Constrained Power Management: Application to a multimedia mobile platform
—In this paper we provide an overview of CPM, a cross-layer framework for Constrained Power Management, and we present its application on a real use case. This framework involves...
Patrick Bellasi, Stefano Bosisio, Matteo Carnevali...
93
Voted
SEC
2001
15 years 2 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
AP2PC
2003
Springer
15 years 6 months ago
Mobile Agents for Locating Documents in Ad Hoc Networks
The wide availability of mobile devices equipped with wireless communication capabilities together with the technical possibility to form adhoc networks paves the way for building ...
Khaled Nagi, Iman Elghandour, Birgitta König-...
CIA
2008
Springer
15 years 3 months ago
Towards a Monitoring Framework for Agent-Based Contract Systems
The behaviours of autonomous agents may deviate from those deemed to be for the good of the societal systems of which they are a part. Norms have therefore been proposed as a means...
Noura Faci, Sanjay Modgil, Nir Oren, Felipe Rech M...
ADHOCNOW
2007
Springer
15 years 7 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...