Sciweavers

1216 search results - page 90 / 244
» Self-Protected Mobile Agents
Sort
View
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 6 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
118
Voted
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 2 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
105
Voted
JUCS
2008
138views more  JUCS 2008»
15 years 18 days ago
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
: A central characteristic of ad hoc mobile networks is the frequent changes of their topology. This is the source of many problems that need to be solved. AODV is an on-demand rou...
SungSoo Lee, HangKon Kim, ChongGun Kim
ICMCS
2005
IEEE
135views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Retrieving, Adapting and Delivering Multimedia Content Using a Mobile Agent Architecture
An integrated, reconfigurable, adaptable and open system for mining, indexing and retrieving multimedia information based on a mobile agent technology scheme is presented. The sys...
Nikolaos Papadakis, Anastasios D. Doulamis, Dimitr...
ISCIS
2003
Springer
15 years 5 months ago
MAPSEC: Mobile-Agent Based Publish/Subscribe Platform for Electronic Commerce
Electronic commerce technology offers the opportunity to integrate and optimize the global production and distribution on supply chain. Computers of various corporations, located t...
Ozgur Koray Sahingoz, Nadia Erdogan