Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...
This work outlines the design process of a user centered learning object repository. A repository should foster the development and acquisition of both generic and specific informa...
We have been developing an approach for the distributed coordination of heterogeneous, autonomous agents. This approach takes as input (a) agent skeletons, giving compact descript...
An experimental study is presented in which participants perform impact analysis on alternate forms of design record information. The primary objective of the research is to asses...