Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Entire DC Network
A New Linear-Programming Based Admissible Heuristic For Cost-Based Abducaton, Muhamed Salah-Al-Din Hefny
A New Linear-Programming Based Admissible Heuristic For Cost-Based Abducaton, Muhamed Salah-Al-Din Hefny
Archived Theses and Dissertations
No abstract provided.
Associating Nodes With Routers In K-Ary M-Way Interconnection Networks, Aya Hassan Saad
Associating Nodes With Routers In K-Ary M-Way Interconnection Networks, Aya Hassan Saad
Archived Theses and Dissertations
No abstract provided.
Security In Mobile Agent Systems: An Approach To Protect Mobile Agents From Malicious Host Attacks, Dalia Fakhry
Security In Mobile Agent Systems: An Approach To Protect Mobile Agents From Malicious Host Attacks, Dalia Fakhry
Archived Theses and Dissertations
Mobile agents are autonomous programs that roam the Internet from machine to machine under their own control on behalf of their users to perform specific pre-defined tasks. In addition to that, a mobile agent can suspend its execution at any point; transfer itself to another machine then resume execution at the new machine without any loss of state. Such a mobile model can perform many possible types of operations, and might carry critical data that has to be protected from possible attacks. The issue of agent security and specially agent protection from host attacks has been a hot topic and …
Clustered Simulation Modeling For The Probabilistic Analysis Of Large Networks, Amr Ahmed Kandil
Clustered Simulation Modeling For The Probabilistic Analysis Of Large Networks, Amr Ahmed Kandil
Archived Theses and Dissertations
No abstract provided.