Sciweavers

981 search results - page 88 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
149
Voted
MOBISYS
2008
ACM
16 years 1 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
CCGRID
2009
IEEE
15 years 8 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
TMC
2011
164views more  TMC 2011»
14 years 8 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
85
Voted
AGENTS
2000
Springer
15 years 5 months ago
Towards a fault-tolerant multi-agent system architecture
Multi-agent systems are prone to failures typical of any distributed system. Agents and resources may become unavailable due to machine crashes, communication breakdowns, process ...
Sanjeev Kumar, Philip R. Cohen
ICDE
2005
IEEE
107views Database» more  ICDE 2005»
15 years 7 months ago
Implementation of an Agent Architecture for Automated Index Tuning
It has been important to extend database management systems to support new requirements of applications and administration. We focus in this paper on the automatic tuning feature,...
Rogério Luís de Carvalho Costa, S&ea...