Mobile agent

Results: 283



#Item
191Ant robotics / Artificial intelligence / Biology / Mobile robot / Swarm behaviour / Autonomous robot / Swarm intelligence / Cognitive robotics / Time / Multi-agent systems / Robotics / Robot

Effect of Sensor and Actuator Quality on Robot Swarm Algorithm Performance

Add to Reading List

Source URL: micro.seas.harvard.edu

Language: English - Date: 2011-11-09 17:00:26
192Electronic commerce / Mobile telecommunications / Mobile banking / Mobile content / Branchless banking / Bank / Mobile phone / Mobile Payments in India / Banking agent / Technology / Mobile technology / Payment systems

2010_GTZ-ICT4D-Berlin_KfWBranchless Banking_Karl von Klitzing

Add to Reading List

Source URL: ict.ez-blogs.de

Language: English - Date: 2010-11-16 09:45:22
193Security / Computing platforms / Computer security / X.509 / PERMIS / Authorization certificate / Public key certificate / Revocation list / Mobile agent / Computing / Public-key cryptography / Key management

A Privilege Management Scheme for Mobile Agent Systems W. A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
194Distributed computing architecture / Mobile agent / Software agent / Java / Aglets / Agent / Law of agency / 2APL / Computing / Artificial intelligence / Multi-agent systems

F:agentSecurityFI[removed]PFP#[removed]]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
195Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:38:16
196Computer security / Security / Software agent / Mobile agent / Vulnerability / Network security / Security testing / Denial-of-service attack / Attack / Computer network security / Cyberwarfare / Software testing

Network Security Testing Using Mobile Agents Title: Network Security Testing Using Mobile Agents

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
197Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
198Computer security / Aglets / Mobile agent / PERMIS / X.509 / Software agent / Public key certificate / Authorization certificate / Privilege Management Infrastructure / Cryptography / Public-key cryptography / Key management

Privilege Management of Mobile Agents Wayne Jansen, Tom Karygiannis National Institute of Standards and Technology Abstract: Most mobile agent systems use internal data structures within an agent to control and specify i

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
199Radio resource management / Network topology / Wireless mesh network / Mesh networking / Wireless ad-hoc network / IEEE 802 / Cellular network / Handover / Internet access / Technology / Wireless networking / Wireless

1 Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks Bo Rong1, Yi Qian2 , Kejie Lu1 , and Michel Kadoch3 Department of Electrical and Computer Engineering

Add to Reading List

Source URL: w3.antd.nist.gov

Language: English - Date: 2009-03-06 13:35:00
200Relational database management systems / Dispute resolution / Mediation / Mobile agent / SQL / Java / Encryption / Computing / Software engineering / Cross-platform software

Secure Mediation with Mobile Code? Joachim Biskup, Barbara Sprick, and Lena Wiese Universit¨ at Dortmund, D[removed]Dortmund, Germany, {biskup,sprick,wiese}@ls6.cs.uni-dortmund.de, home page: http://ls6-www.cs.uni-dortmun

Add to Reading List

Source URL: wiese.free.fr

Language: English - Date: 2009-06-22 13:18:12
UPDATE