Sciweavers

1216 search results - page 66 / 244
» Self-Protected Mobile Agents
Sort
View
115
Voted
ACMICEC
2006
ACM
116views ECommerce» more  ACMICEC 2006»
15 years 6 months ago
Towards flexible mobile payment via mediator-based service model
Applications and digital goods for mobile devices have been around for more than a decade. Recent technology development has also driven the use of mobile commerce technology. Mob...
Charles Chong, Hui-Na Chua, Cheng-Suan Lee
96
Voted
AAAI
2011
14 years 17 days ago
Composite Social Network for Predicting Mobile Apps Installation
We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software...
Wei Pan, Nadav Aharony, Alex Pentland
127
Voted
INFOCOM
2010
IEEE
14 years 10 months ago
Maintaining Approximate Minimum Steiner Tree and k-center for Mobile Agents in a Sensor Network
Abstract--We study the problem of maintaining group communication between m mobile agents, tracked and helped by n static networked sensors. We develop algorithms to maintain a O(l...
Dengpan Zhou, Jie Gao
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
15 years 5 months ago
Java Mobile Agents on Project JXTA Peer-to-Peer Platform
Over the last year Peer-to-Peer (p2p) implementations have evolved from experimental to sophisticated systems. Mobile agents have a long e-Commerce history dating back to the midd...
Rita Yu Chen, Bill Yeager
MA
2001
Springer
98views Communications» more  MA 2001»
15 years 5 months ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth