Sciweavers

1998 search results - page 232 / 400
» Situated Control Rules
Sort
View
WPES
2004
ACM
15 years 10 months ago
Will your digital butlers betray you?
The cost of data storage is now so low that there is little necessity ever to delete anything. The consequence is denied oblivion—digital systems that remember forever and can b...
Frank Stajano
ATAL
2004
Springer
15 years 10 months ago
Contract Model for Agent Mediated Electronic Commerce
In Agent Mediated Electronic Commerce, autonomy of agents is an important property. On one hand, it has to be favored to make the agents able to determine and adapt their own goal...
Benjamin Gâteau, Djamel Khadraoui, Olivier B...
ISER
2004
Springer
163views Robotics» more  ISER 2004»
15 years 10 months ago
Deployment and Connectivity Repair of a Sensor Net with a Flying Robot
We consider multi-robot systems that include sensor nodes and aerial or ground robots networked together. Such networks are suitable for tasks such as large-scale environmental mon...
Peter I. Corke, Stefan Hrabar, Ronald A. Peterson,...
POLICY
2004
Springer
15 years 10 months ago
Policy-based Congestion Management for an SMS Gateway
We present a policy-based approach to managing congestions in Short Message Service (SMS) systems. Congestion situations typically occur on SMS Gateways (SMSGs), which route SMS m...
Alberto Gonzalez Prieto, Roberto Cosenza, Rolf Sta...
WPES
2003
ACM
15 years 10 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...