Sciweavers

981 search results - page 72 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
IWCMC
2010
ACM
15 years 1 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
VTC
2010
IEEE
158views Communications» more  VTC 2010»
14 years 12 months ago
QoS and Flow Management for Future Multi-Hop Mobile Radio Networks
Abstract— Mobile radio networks of the IMT-Advanced systems family promise ubiquitous broadband access and high area coverage, with rates of several 100 MBit/s. They claim to gua...
Rainer Schoenen, Arif Otyakmaz
ESORICS
2009
Springer
16 years 2 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
HAIS
2008
Springer
15 years 2 months ago
Design Patterns for Combining Social and Individual Intelligences on Modular-Based Agents
Design patterns have been recently concerned in the multi-agent community for the design of systems with decentralized coordination. In this paper we present a design pattern for d...
Bianca Innocenti, Beatriz López, Joaquim Sa...
EUROMICRO
1997
IEEE
15 years 5 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...