-
2
-
-
67349234044
-
-
Tan J.J., Pimentão J.P., Poslad S., Calisti M., Yip A., Foukia N., Jurca R., Khadraoui D., and Vitabile S. Agentcities/Opennet Forum, Security Working Group: security requirements for the Agentcities network (2004). http://www.agentcities.org/out/00023/actf-out-00023a.pdf
-
(2004)
Agentcities/Opennet Forum, Security Working Group: security requirements for the Agentcities network
-
-
Tan, J.J.1
Pimentão, J.P.2
Poslad, S.3
Calisti, M.4
Yip, A.5
Foukia, N.6
Jurca, R.7
Khadraoui, D.8
Vitabile, S.9
-
3
-
-
0003074644
-
Bellifemine, Agostino Poggi, Giovanni Rimassa, JADE-A FIPA-compliant agent framework CSELT internal technical report
-
London, April
-
Fabio Bellifemine, Agostino Poggi, Giovanni Rimassa, JADE-A FIPA-compliant agent framework CSELT internal technical report. Part of this report has been also published in Proceedings of PAAM'99, London, April 1999, pp.97-108.
-
(1999)
Part of this report has been also published in Proceedings of PAAM
, vol.99
, pp. 97-108
-
-
Fabio1
-
4
-
-
84867464826
-
Developing multi-agent systems with JADE
-
Proc. of the 7th International Workshop on Intelligent Agent. Theories, Architectures and Languages ATAL-2000, ISBN 3-540-42422-9, Springer
-
F. Bellifemine, A. Poggi, G. Rimassa, Developing multi-agent systems with JADE, Proc. of the 7th International Workshop on Intelligent Agent. Theories, Architectures and Languages (ATAL-2000), LNCS, vol. 1986, pp. 89-103, ISBN 3-540-42422-9, Springer.
-
LNCS
, vol.1986
, pp. 89-103
-
-
Bellifemine, F.1
Poggi, A.2
Rimassa, G.3
-
7
-
-
8344273490
-
Communication security in multi-agent systems
-
Mařík V.V., et al. (Ed), Springer-Verlag, Berlin Heidelberg 2003
-
Novák P., Rollo M., Hodík J., and Vlcek T. Communication security in multi-agent systems. In: Mařík V.V., et al. (Ed). CEEMAS 2003, LNAI 2691 (2003), Springer-Verlag, Berlin Heidelberg 454-463 2003
-
(2003)
CEEMAS 2003, LNAI 2691
, pp. 454-463
-
-
Novák, P.1
Rollo, M.2
Hodík, J.3
Vlcek, T.4
-
8
-
-
84898461551
-
-
URL
-
P. Novak, M. Rollo, J. Hodik, T. Vlcekand, M. Pechoucek. X-Security architecture in agentcities, URL:http://agents.felk.cvut.cz/security/main/index.php.
-
X-Security architecture in agentcities
-
-
Novak, P.1
Rollo, M.2
Hodik, J.3
Vlcekand, T.4
Pechoucek, M.5
-
10
-
-
14544308109
-
A buddy model of security for mobile agent communities operating in pervasive scenarios
-
ACS, Dunedin
-
Page J., Zaslavsky A., and Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios. Proc. of 2nd Australasian Information Security Workshop (AISW2004) 32 (2004), ACS, Dunedin 17-25
-
(2004)
Proc. of 2nd Australasian Information Security Workshop (AISW2004)
, vol.32
, pp. 17-25
-
-
Page, J.1
Zaslavsky, A.2
Indrawan, M.3
-
15
-
-
33751538536
-
Cougaar: a robust configurable multi agent platform
-
0-7803-8870-4
-
Helsinger A., and Wright T. Cougaar: a robust configurable multi agent platform. Proc. of IEEE Conference Aerospace (March 5-12 2005). 0-7803-8870-4 1-10
-
(2005)
Proc. of IEEE Conference Aerospace
, pp. 1-10
-
-
Helsinger, A.1
Wright, T.2
-
16
-
-
0002992633
-
D'Agents: security in a multiple-language, mobile-agent system
-
Vigna G. (Ed), Springer-Verlag
-
Gray R.S., Kotz D., Cybenko G., and Rus D. D'Agents: security in a multiple-language, mobile-agent system. In: Vigna G. (Ed). Mobile Agents and Security, Lecture Notes in Computer Science (1998), Springer-Verlag
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
17
-
-
0000884365
-
A fingerprint verification system based on triangular matching and dynamic time warping
-
Zsolt M., and Kovacs V. A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Transaction on Pattern Analysis and Machine Intelligence 22 11 (2000) 1266-1276
-
(2000)
IEEE Transaction on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.11
, pp. 1266-1276
-
-
Zsolt, M.1
Kovacs, V.2
-
18
-
-
0032631510
-
Fingerprint classification by directional image partitioning
-
Cappelli R., Lumini A., Mario D., and Maltoni D. Fingerprint classification by directional image partitioning. IEEE Transaction on Pattern Analysis and Machine Intelligence 21 5 (1999) 402-421
-
(1999)
IEEE Transaction on Pattern Analysis and Machine Intelligence
, vol.21
, Issue.5
, pp. 402-421
-
-
Cappelli, R.1
Lumini, A.2
Mario, D.3
Maltoni, D.4
-
20
-
-
0031122443
-
On-Line Fingerprint Verification
-
A. Jain, L. Hong, R. Bolle, On-Line Fingerprint Verification, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 19, n. 4, 1997.
-
(1997)
IEEE Transaction on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.4
-
-
Jain, A.1
Hong, L.2
Bolle, R.3
-
21
-
-
33744965279
-
Verification of ink-on-paper fingerprints by using image processing techniques and a new matching operator
-
Conti V., Pilato G., Vitabile S., and Sorbello F. Verification of ink-on-paper fingerprints by using image processing techniques and a new matching operator. AI*IA Siena (September 10-13 2002) 594-601
-
(2002)
AI*IA Siena
, pp. 594-601
-
-
Conti, V.1
Pilato, G.2
Vitabile, S.3
Sorbello, F.4
-
22
-
-
27944492919
-
ThumbPod puts security under your thumb
-
October, Winter, EE Department, UCLA
-
Patrick Schaumont, Ingrid Verbauwhede-"ThumbPod puts security under your thumb", Xilinx Xcell Journal, October 2003 (Winter 2004), EE Department, UCLA.
-
(2003)
Xilinx Xcell Journal
-
-
Schaumont, P.1
Verbauwhede-, I.2
-
23
-
-
33744966009
-
-
UNISC, Departamento de Informatica Santa Cruz-Brazil, PUCRS, Faculdade de Informatica porto Alegre, Brazil
-
Vanderlei Bonato, Rolf Fredi Molz, João Carlos Furtado, Marcos Flôres Ferrão, Fernando G. Moraes: "Propose of a hardware implementation for fingerprint systems". UNISC - Departamento de Informatica Santa Cruz-Brazil, PUCRS - Faculdade de Informatica porto Alegre - Brazil.
-
Propose of a hardware implementation for fingerprint systems
-
-
Bonato, V.1
Fredi Molz, R.2
Carlos Furtado, J.3
Flôres Ferrão, M.4
Moraes, F.G.5
-
24
-
-
50249129537
-
An Embedded Fingerprint Recognizer
-
Z. Shao, Y. Zhang, and L. T. Yang Editors, Chapter 24, ISBN: 1-58883-112-4, American Scientific Publishers, in press
-
S. Vitabile, V. Conti, F. Sorbello, "An Embedded Fingerprint Recognizer", in Embedded Systems: Status and Perspective, Z. Shao, Y. Zhang, and L. T. Yang Editors, Chapter 24, ISBN: 1-58883-112-4, American Scientific Publishers, in press.
-
Embedded Systems: Status and Perspective
-
-
Vitabile, S.1
Conti, V.2
Sorbello, F.3
-
26
-
-
85041439566
-
Principles of trust for MAS: cognitive anatomy, social importance, and quantification
-
Castelfranchi C., and Falcone R. Principles of trust for MAS: cognitive anatomy, social importance, and quantification. Proc. of ICMAS-98 (1998) 72-79
-
(1998)
Proc. of ICMAS-98
, pp. 72-79
-
-
Castelfranchi, C.1
Falcone, R.2
-
27
-
-
0034275135
-
Responsible behavior for networked agents - a distributed computing perspective
-
E. Mamdani, J. Pitt, Responsible behavior for networked agents - a distributed computing perspective, IEEE Internet Computing 4 (5) (2000) 27-31.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.5
, pp. 27-31
-
-
Mamdani, E.1
Pitt, J.2
-
28
-
-
84962115989
-
Toward socially sophisticated BDI agents
-
F. Dignum, D. Morley, E.A. Sonenberg, L. Cavedon, Toward socially sophisticated BDI agents, Proceedings of the ICMAS 2000, 2000, pp. 111-118.
-
(2000)
Proceedings of the ICMAS
, pp. 111-118
-
-
Dignum, F.1
Morley, D.2
Sonenberg, E.A.3
Cavedon, L.4
-
30
-
-
67349102219
-
-
http://web.mit.edu/kerberos. Last access 05/07/2008.
-
http://web.mit.edu/kerberos. Last access 05/07/2008.
-
-
-
-
31
-
-
67349219324
-
-
http://www.ibm.com. Last access 05/07/2008.
-
http://www.ibm.com. Last access 05/07/2008.
-
-
-
-
32
-
-
67349285315
-
-
http://www.dec.com. Last access 05/07/2008.
-
http://www.dec.com. Last access 05/07/2008.
-
-
-
-
35
-
-
0034809453
-
-
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, 40, no. 3.x, 2001.
-
N.K. Ratha, J.H. Connell, R.M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3.x, 2001.
-
-
-
-
38
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
41
-
-
67349259541
-
-
FIPA home page, URL: http://www.fipa.org. Last access 05/07/2008.
-
FIPA home page, URL: http://www.fipa.org. Last access 05/07/2008.
-
-
-
-
42
-
-
33646410363
-
An enhanced authentication system for the JADE-S platform
-
Conti V., Vitabile S., Pilato G., and Sorbello F. An enhanced authentication system for the JADE-S platform. WSEAS Transaction on Information Science and Application 1 1 (Jul. 2004) 178-183
-
(2004)
WSEAS Transaction on Information Science and Application
, vol.1
, Issue.1
, pp. 178-183
-
-
Conti, V.1
Vitabile, S.2
Pilato, G.3
Sorbello, F.4
-
43
-
-
67349085691
-
-
Thomas J. Watson Jr., The Considerations of Data Security in a Computer Environment, IBM (Hrgs.), 1968 04 05, IBM, ISBN/Best-Nr: G520-2169-00.
-
Thomas J. Watson Jr., The Considerations of Data Security in a Computer Environment, IBM (Hrgs.), 1968 04 05, IBM, ISBN/Best-Nr: G520-2169-00.
-
-
-
-
45
-
-
13844273360
-
Web directories as a knowledge base to build a multi-agent system for information sharing
-
IOS Press N. 4, ISBN: 1570-1263
-
Pilato G., Vitabile S., Conti V., Vassallo G., and Sorbello F. Web directories as a knowledge base to build a multi-agent system for information sharing. Web Intelligence and Agent Systems-An International Journal 2 (2004), IOS Press 265-277 N. 4, ISBN: 1570-1263
-
(2004)
Web Intelligence and Agent Systems-An International Journal
, vol.2
, pp. 265-277
-
-
Pilato, G.1
Vitabile, S.2
Conti, V.3
Vassallo, G.4
Sorbello, F.5
-
46
-
-
67349088957
-
-
URL: http://www.celoxica.com. Last access 05/07/2008.
-
URL: http://www.celoxica.com. Last access 05/07/2008.
-
-
-
-
47
-
-
67349230785
-
-
URL: http://www.precisebiometrics.com. Last access 05/07/2008.
-
URL: http://www.precisebiometrics.com. Last access 05/07/2008.
-
-
-
-
48
-
-
33751093562
-
Biometric features for mobile agents ownership
-
IPSI Bgd (Ed) N. 1, ISBN: 1820-4503
-
Vitabile S., Pilato G., Conti V., Gioè G., and Sorbello F. Biometric features for mobile agents ownership. In: IPSI Bgd (Ed). IPSI BgD Transactions on Internet Research 1 (Jan 2005) 81-89 N. 1, ISBN: 1820-4503
-
(2005)
IPSI BgD Transactions on Internet Research
, vol.1
, pp. 81-89
-
-
Vitabile, S.1
Pilato, G.2
Conti, V.3
Gioè, G.4
Sorbello, F.5
|