نتایج جستجو برای: protection agent

تعداد نتایج: 428050  

Journal: :Entropy 2015
George Wilmers

The present paper seeks to establish a logical foundation for studying axiomatically multi-agent probabilistic reasoning over a discrete space of outcomes. We study the notion of a social inference process which generalises the concept of an inference process for a single agent which was used by Paris and Vencovská to characterise axiomatically the method of maximum entropy inference. Axioms fo...

2015
Deepika Sharma

In this paper we specify a set of security services and architecture of agent which is based upon mobile system. The security services are mainly divide into three main classes which is named as security services for protection of execution platform, protecting agent using security services ,communication for security services. We also describe functionality of security and where functionality ...

2011
P. Y. Li

The objectives of this project are to study how the total flooding gas protection system with the FM-200 clean agent is used in Hong Kong. The performance of the systems is evaluated with relevant properties of the clean agent described. It is followed by introducing the installation application on buildings in Hong Kong. A cost analysis on installation is presented. Testing and commissioning o...

2016
Christopher P. Taggart

The Voluntary Act Requirement (“VAR”) is the fundamental predicate for imposing legal punishment. Punishing solely on the basis of evil thoughts or a villainous character is impermissible. The VAR also embodies the notion that we must not punish someone for conduct over which she lacked sufficient control. But why not punish someone for conduct that was not within her control? One answer is ret...

2010
Cameron Hepburn

Environmental policy is made in a context of both market failure and government failure. On the one hand, leaving environmental protection to the free market, relying on notions of corporate social responsibility and altruistic consumer and shareholder preferences, will not deliver optimal results. On the other hand, nationalizing the delivery of environmental protection is likely to fail becau...

Journal: :IJCSA 2012
Yuh-Jong Hu Win-Nan Wu Jiun-Jan Yang

Extending from the previous semantic privacy-preserving model, we propose a widescale super-peer data integration and protection architecture. Any user from a superpeer domain can contribute new data, schema, or even mappings for other super-peer domains to integrate the information. Each super-peer domain is essentially a mediatorbased data integration system, where an agent at the super-peer ...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2000
M Clemons A Watson A Howell J Chang C Heyworth B Lord N Testa T M Dexter G Margison

Macrophage inflammatory protein 1alpha (MIP-1alpha) is a chemokine that may act principally by preventing hemopoietic cells from entering G1, thereby attenuating the cytotoxic effects of cell cycle-specific chemotherapeutic agents. Here we examine the effect of MIP-1alpha on the sensitivity of human granulocyte-macrophage hemopoietic progenitor cells (granulocyte-macrophage colony-forming cells...

Journal: :journal of advances in computer research 0

in this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition petri nets. the mobile agent system contains two mobile agents called dca and una. it sends out agents to update antivirus on client computers in a network. each agent takes on a specified responsibility. first, dca roams through the network and check the last d...

2006
Raymond S. T. Lee Eddie C. L. Chan Raymond Y. W. Mak

In this paper, an Intelligent Content Management System with Chaotic Copyright Protection scheme called iJADE CMS is presented. iJADE CMS focuses on how web mining techniques can be effectively applied on Chinese content, with the integration of various AI techniques including intelligent agents, agent ontology and fuzzy logic based data mining scheme. Through the adoption of chaotic encryption...

Journal: :J. Network and Computer Applications 2008
Carles Garrigues Sergi Robles Joan Borrell

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید