Sciweavers

1216 search results - page 230 / 244
» Self-Protected Mobile Agents
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 6 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
99
Voted
AVSS
2005
IEEE
15 years 6 months ago
Integrating multi-camera tracking into a dynamic task allocation system for smart cameras
This paper reports on the integration of multi-camera tracking into an agent-based framework, which features autonomous task allocation for smart cameras targeting traffic survei...
Michael Bramberger, Markus Quaritsch, Thomas Winkl...
AISADM
2005
Springer
15 years 6 months ago
Multi-agent Approach for Community Clustering Based on Individual Ontology Annotations
The paper presents peer-to-peer multi-agent framework for community clustering based on contact propagation in the global network of contacts with individual ontology-based descrip...
Dmitri Soshnikov
COORDINATION
2005
Springer
15 years 6 months ago
A Correct Abstract Machine for Safe Ambients
t Abstract Machine for Safe Ambients Daniel Hirschkoff1 , Damien Pous1 , and Davide Sangiorgi2 1 ENS Lyon, France 2 Universit`a di Bologna, Italy Abstract. We describe an abstract...
Daniel Hirschkoff, Damien Pous, Davide Sangiorgi
114
Voted
EUC
2005
Springer
15 years 5 months ago
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments
Abstract. In the future, homes will have numerous intelligent communicating devices, and the user would like to configure and coordinate their actions. Appliances and people in in...
Victor Zamudio, Victor Callaghan, Jeannette Shiaw-...