Sciweavers

1216 search results - page 31 / 244
» Self-Protected Mobile Agents
Sort
View
NOMS
2000
IEEE
15 years 4 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
118
Voted
ICCS
2004
Springer
15 years 5 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
125
Voted
WETICE
1998
IEEE
15 years 4 months ago
Using Components for Modeling Intelligent and Collaborative Mobile Agents
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...
Min-Jung Woo, Jean-Pierre Briot, Jacques Ferber
105
Voted
WOA
2010
14 years 10 months ago
Classification of Whereabouts Patterns From Large-scale Mobility Data
Classification of users' whereabouts patterns is important for many emerging ubiquitous computing applications. Latent Dirichlet Allocation (LDA) is a powerful mechanism to e...
Laura Ferrari, Marco Mamei