-
3
-
-
54949121812
-
-
N.G. Aghaee, T.I. Oren, Effects of cognitive complexity in agent simulation: basics, in: Proceedings of the Summer Computer Simulation Conference, 2004, pp. 15-19.
-
N.G. Aghaee, T.I. Oren, Effects of cognitive complexity in agent simulation: basics, in: Proceedings of the Summer Computer Simulation Conference, 2004, pp. 15-19.
-
-
-
-
4
-
-
54949151151
-
-
A.S. Rao, M. Georgeff, BDI agents: from theory to practice, in: Proceedings of the First International Conference on Multi-Agent Systems, 1995, pp. 312-319.
-
A.S. Rao, M. Georgeff, BDI agents: from theory to practice, in: Proceedings of the First International Conference on Multi-Agent Systems, 1995, pp. 312-319.
-
-
-
-
5
-
-
54949107853
-
-
T. Shimoda, A Theory Belief Model for Cognitive Agents, Colorado State University.
-
T. Shimoda, A Theory Belief Model for Cognitive Agents, Colorado State University.
-
-
-
-
6
-
-
0029232793
-
-
D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, 1994, pp. 196-199.
-
D. Samfat, R. Molva, A method providing identity privacy to mobile users during authentication, in: IEEE Workshop on Mobile Computing Systems and Applications, 1994, pp. 196-199.
-
-
-
-
7
-
-
4544376760
-
-
A. Qayedi, W. Adi, A. Zahro, A. Mabrouk, Combined web/mobile authentication for secure web access control, in: Wireless Communications and Networking Conference, vol. 2, 2004, pp. 677-681.
-
A. Qayedi, W. Adi, A. Zahro, A. Mabrouk, Combined web/mobile authentication for secure web access control, in: Wireless Communications and Networking Conference, vol. 2, 2004, pp. 677-681.
-
-
-
-
8
-
-
54949121811
-
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert, T. Zhang, Adaptive privacy-preserving authentication in vehicular networks, in: First International Conference on Communications and Networking in China, 2006, pp. 1-8.
-
K. Sha, Y. Xi, W. Shi, L. Schwiebert, T. Zhang, Adaptive privacy-preserving authentication in vehicular networks, in: First International Conference on Communications and Networking in China, 2006, pp. 1-8.
-
-
-
-
9
-
-
26444533983
-
-
H. Chen, T.V.L.N. Sivakumar, New authentication method for mobile centric communications, in: The IEEE 61st Conference on Vehicular Technology, 2005, pp. 2780-2784.
-
H. Chen, T.V.L.N. Sivakumar, New authentication method for mobile centric communications, in: The IEEE 61st Conference on Vehicular Technology, 2005, pp. 2780-2784.
-
-
-
-
10
-
-
27544491391
-
-
D.P. Benjamin, R.S. Iyer, A. Perumal, VMSoar: a cognitive agent for network security, in: Proceedings of SPIE, vol. 5812, 2005, pp. 72-80.
-
D.P. Benjamin, R.S. Iyer, A. Perumal, VMSoar: a cognitive agent for network security, in: Proceedings of SPIE, vol. 5812, 2005, pp. 72-80.
-
-
-
-
12
-
-
54949142218
-
-
C.M. Jonker, J. Treur, W. de Vries, Temporal analysis of the dynamics of beliefs, desires, and intentions, in: Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions, and Values: Computational Architectures), vol. 2, 2002, pp. 471-494.
-
C.M. Jonker, J. Treur, W. de Vries, Temporal analysis of the dynamics of beliefs, desires, and intentions, in: Cognitive Science Quarterly (Special Issue on Desires, Goals, Intentions, and Values: Computational Architectures), vol. 2, 2002, pp. 471-494.
-
-
-
-
13
-
-
54949103616
-
-
S.S. Chan, X. Fang, K. Brzezinski, Y. Zhow, S. Xu, J. Lam, Usability for mobile commerce across multiple form factors, Journal of Electronic Commerce Research 3 (2002) 187-199.
-
S.S. Chan, X. Fang, K. Brzezinski, Y. Zhow, S. Xu, J. Lam, Usability for mobile commerce across multiple form factors, Journal of Electronic Commerce Research 3 (2002) 187-199.
-
-
-
-
14
-
-
13844302727
-
-
P.S. Alvirado, C.L. Roncancio, M. Adiba, Analyzing mobile transactions support for DBMS, in: The 12th International Workshop on Database and Expert Systems Applications, 2001, pp. 595-600.
-
P.S. Alvirado, C.L. Roncancio, M. Adiba, Analyzing mobile transactions support for DBMS, in: The 12th International Workshop on Database and Expert Systems Applications, 2001, pp. 595-600.
-
-
-
-
15
-
-
0031651439
-
-
E. Bertino, S. Jajodia, L. Mancini, I. Ray, Advanced transaction processing in multilevel secure file stores, in: IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, 1998, pp. 120-135.
-
E. Bertino, S. Jajodia, L. Mancini, I. Ray, Advanced transaction processing in multilevel secure file stores, in: IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 1, 1998, pp. 120-135.
-
-
-
-
16
-
-
74849130457
-
-
D. Rosenthal, F. Fung, A test for non-disclosure in security level translations, in: IEEE Symposium on Security and Privacy, 1999, pp. 196-206.
-
D. Rosenthal, F. Fung, A test for non-disclosure in security level translations, in: IEEE Symposium on Security and Privacy, 1999, pp. 196-206.
-
-
-
-
17
-
-
85118286626
-
-
S. Sutikno, A. Surya, An architecture of F(22N) multiplier for elliptic curves cryptosystem, in: Proceedings of ISCAS 2000 on Circuits and Systems, vol. 1, 2000, pp. I-279-I-282.
-
S. Sutikno, A. Surya, An architecture of F(22N) multiplier for elliptic curves cryptosystem, in: Proceedings of ISCAS 2000 on Circuits and Systems, vol. 1, 2000, pp. I-279-I-282.
-
-
-
-
18
-
-
54949084289
-
-
http://sourceforge.net/projects/agentfactory.
-
http://sourceforge.net/projects/agentfactory.
-
-
-
|