Sciweavers

1998 search results - page 304 / 400
» Situated Control Rules
Sort
View
MATA
2004
Springer
101views Communications» more  MATA 2004»
15 years 9 months ago
Mobile Tourist Guide Services with Software Agents
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Juan Pavón, Juan M. Corchado, Jorge J. G&oa...
PDCAT
2004
Springer
15 years 9 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
ICALT
2003
IEEE
15 years 9 months ago
Students' Understanding of Computer Networks in an Internationally Distributed Course
The different ways in which concepts within computer networks are understood by master level students who take an internationally distributed project-based course have been identi...
Anders Berglund, Arnold Neville Pears
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
15 years 9 months ago
AMCA: an Active-based Multicast Congestion Avoidance Algorithm
Many works have recently addressed the issue of congestion control for multicast communications and the problem is known to be highly complex. Scalability, responsiveness, stabili...
Moufida Maimour, CongDuc Pham