Sciweavers

1216 search results - page 65 / 244
» Self-Protected Mobile Agents
Sort
View
IMTCI
2004
Springer
15 years 6 months ago
Mobile Agents: Preserving Privacy and Anonymity
The paper presents two new methods for providing mobile agents with privacy and anynomity. The proposed schemes are based on different cryptographic primitives: a secret-sharing s...
Aneta Zwierko, Zbigniew Kotulski
100
Voted
IADIS
2003
15 years 1 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
111
Voted
ICPPW
1999
IEEE
15 years 4 months ago
Design of MOBILE MOM: Message Oriented Middleware Service for Mobile Computing
Message oriented middleware (MOM) is a specific class of middleware that operates on the principles of message passing or message queuing. Existing MOM syste doesn't support ...
Do-Guen Jung, Kwang-Jin Paek, Tai-Yun Kim
MATES
2005
Springer
15 years 6 months ago
CASCOM: Context-Aware Service Co-ordination in Mobile P2P Environments
Abstract. The research project CASCOM (Context-aware Business Application Service Co-ordination in Mobile Computing Environments) will implement, validate, and trial value-added su...
Heikki Helin, Matthias Klusch, António Lope...
AAAI
2010
15 years 2 months ago
A Bayesian Nonparametric Approach to Modeling Mobility Patterns
Constructing models of mobile agents can be difficult without domain-specific knowledge. Parametric models flexible enough to capture all mobility patterns that an expert believes...
Joshua Mason Joseph, Finale Doshi-Velez, Nicholas ...