Sciweavers

1216 search results - page 184 / 244
» Self-Protected Mobile Agents
Sort
View
MATES
2004
Springer
15 years 6 months ago
From Modeling to Simulation of Multi-agent Systems: An Integrated Approach and a Case Study
Abstract. In this paper, an integrated approach for the modeling and the validation through simulation of multi-agent systems is proposed. The approach centers on the instantiation...
Giancarlo Fortino, Alfredo Garro, Wilma Russo
MA
2000
Springer
104views Communications» more  MA 2000»
15 years 4 months ago
Portable Support for Transparent Thread Migration in Java
In this paper, we present a mechanism to capture and reestablish the state of Java threads. We achieve this by extracting a thread's execution state from the application code ...
Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Conin...
AICS
2009
14 years 10 months ago
SceneMaker: Intelligent Multimodal Visualisation of Natural Language Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to facil...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...
ISSA
2004
15 years 1 months ago
Propagating Trust In The Web Services Framework
In this paper, we discuss one possible way of establishing trust between a user entity and a web service. We will assume that the user entity is machine-based (i.e. some software,...
Anitta Thomas
91
Voted
SIGOPS
2002
69views more  SIGOPS 2002»
15 years 6 days ago
On the value of threshold signatures
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson