Sciweavers

1216 search results - page 162 / 244
» Self-Protected Mobile Agents
Sort
View
122
Voted
MATA
2000
Springer
15 years 4 months ago
Keyphrase-Based Information Sharing in the ACORN Multi-agent Architecture
Abstract. The ACORN provides an agent-based architecture for information retrieval and provision across networks. The main objective of this paper is to present the design and impl...
Hui Yu, Ali A. Ghorbani, Virendra C. Bhavsar, Step...
115
Voted
ESM
1998
15 years 2 months ago
Developing Interest Management Techniques in Distributed Interactive Simulation Using Java
Bandwidth consumption in distributed real-time simulation, or networked real-time simulation, is a major problem as the number of participants and the sophistication of joint simu...
Jon Saville, Simon J. E. Taylor
125
Voted
MONET
2002
185views more  MONET 2002»
15 years 8 days ago
An Adaptive Generalized Transmission Protocol for Ad Hoc Networks
Wireless networking and group communication in combination allows groups of dispersed mobile users to collaborate. This paper presents AGENT, a medium access control (MAC) protocol...
Andrew D. Myers, Gergely V. Záruba, Violet ...
106
Voted
RAS
2007
169views more  RAS 2007»
15 years 3 days ago
Decentralized cooperative control of heterogeneous vehicle groups
We coordinate in discrete time the interaction of two heterogeneous groups of mobile agents: a group of ground vehicles (ugvs) and a group of aerial vehicles (uavs). The ground ag...
Herbert G. Tanner, D. K. Christodoulakis
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 7 months ago
Sufficient conditions for flocking via graph robustness analysis
In this paper, we consider a multi-agent system consisting of mobile agents with second-order dynamics. The communication network is determined by a standard interaction rule based...
Samuel Martin, Antoine Girard