The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recursive branch and bound algorithms are often used, either rigorouslyor non-rigorously, to refine and isolate solutions to global optimizationproblems or systems of equations and inequalities involving nonlinearfunctions. The presented software library, Kodiak, integrates numericand symbolic computation into a generic framework for the solution of suchproblems over hyper-rectangular variable and...
Agent-systems can bring important benefits especially in applications scenarios where highly distributed, autonomous, intelligence, self-organizing and robust systems are required. Furthermore, high levels of autonomy and self-organization of agent systems provide excellent support for development of systems with high dependability requirements. Two main research areas that fall in this category are...
Mobile agents are processes that can migrate autonomously from new hosts. Despite of the huge number of fields of application of this technology, a lack in the security exists. The main approach of this work is based on the provision of a secure execution environment for mobile agents. Our approach is based on the idea of the trusted migration. This trusted migration is reached by means of the use...
Agent-based computing represents a promising paradigm for distributed computing. Unfortunately the lack of security is hindering the application of this paradigm in real world applications. The protection of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In this paper we provide a mechanism that aims to solve the problem of the malicious hosts....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.