Sciweavers

981 search results - page 69 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
127
Voted
AISS
2010
97views more  AISS 2010»
14 years 11 months ago
The Naming Service of Multi-Agent for the Sensor Network Applications
The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determ...
Yonsik Lee, Minseok Jang
AGENTCL
2003
Springer
15 years 6 months ago
Intra-role Coordination Using Group Communication: A Preliminary Report
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...
AMKM
2003
Springer
15 years 6 months ago
Towards Evaluation of Peer-to-Peer-Based Distributed Knowledge Management Systems
Abstract. Distributed knowledge management systems (DKMS) have been suggested to meet the requirements of today’s knowledge management. Peer-to-peer systems offer technical found...
Marc Ehrig, Christoph Schmitz, Steffen Staab, Juli...
94
Voted
NIPS
2004
15 years 2 months ago
New Criteria and a New Algorithm for Learning in Multi-Agent Systems
We propose a new set of criteria for learning algorithms in multi-agent systems, one that is more stringent and (we argue) better justified than previous proposed criteria. Our cr...
Rob Powers, Yoav Shoham
105
Voted
ACSAC
2010
IEEE
14 years 11 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...