Sciweavers

1603 search results - page 135 / 321
» Workflow Management System Using Mobile Agents
Sort
View
FASE
2008
Springer
15 years 5 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
118
Voted
IJWMC
2010
103views more  IJWMC 2010»
15 years 16 days ago
Programmable agents for efficient topology formation of Bluetooth scatternets
The past few years have seen a burst in public interest and widespread use of portable electronic devices featuring both mature and emerging technologies for wireless communication...
Sergio González-Valenzuela, Son T. Vuong, V...
ATAL
2005
Springer
15 years 8 months ago
Demonstration of WS2JADE
Integrating Agents and Web services has recently attracted considerable attention from people in both the agent and Web services communities. The future of intelligent agents with...
Xuan Thang Nguyen
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
15 years 10 months ago
Path planning for data assimilation in mobile environmental monitoring systems
— By combining a low-order model of forecast errors, the extended Kalman filter, and classical continuous optimization, we develop an integrated methodology for planning mobile ...
Franz S. Hover
JCS
2006
118views more  JCS 2006»
15 years 3 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla