Author of the publication

D'Agents: Security in a Multiple-Language, Mobile-Agent System.

, , , and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 154-187. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)Semantic depth and markup complexity., , and . SMC, page 2138-2143. IEEE, (2003)Overview of Control and Game Theory in Adaptive Cyber Defenses., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)A fuzzy MHT algorithm applied to text-based information tracking., , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)Network awareness and mobile agent systems., , , and . IEEE Commun. Mag., 36 (7): 44-49 (1998)Approximation by superpositions of a sigmoidal function.. Math. Control. Signals Syst., 2 (4): 303-314 (1989)Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.. ICASSP, page 498-501. IEEE, (1979)Fixed Hypercube Embedding., , and . Inf. Process. Lett., 25 (1): 35-39 (1987)A Language of Life: Characterizing People Using Cell Phone Tracks., and . CSE (4), page 495-501. IEEE Computer Society, (2009)