Sciweavers

1216 search results - page 234 / 244
» Self-Protected Mobile Agents
Sort
View
90
Voted
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 2 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
ATC
2008
Springer
15 years 2 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
107
Voted
CCCG
2008
15 years 1 months ago
Memory Requirements for Local Geometric Routing and Traversal in Digraphs
Local route discovery in geometric, strongly connected, undirected plane graphs is guaranteed by the Face Routing algorithm. The algorithm is local and geometric in the sense that...
Maia Fraser, Evangelos Kranakis, Jorge Urrutia
SIROCCO
2010
15 years 1 months ago
Asynchronous Deterministic Rendezvous in Bounded Terrains
Abstract. Two mobile agents (robots) have to meet in an a priori unknown bounded terrain modeled as a polygon, possibly with polygonal obstacles. Robots are modeled as points, and ...
Jurek Czyzowicz, David Ilcinkas, Arnaud Labourel, ...
AIA
2006
15 years 1 months ago
Synthesizing Diagnostic Explanations from Monitoring Data in Multi-Robot Systems
The paper discusses the issues concerning monitoring and diagnosis of a multi-robot system involving a team of mobile robots providing services in an environment which is partiall...
Roberto Micalizio, Pietro Torasso, Gianluca Torta