: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...
Abstract. Mobile devices provide a variety of ways to access information resources available on the Web and a high level of adaptability to different aspects (e.g., device capabili...
Davide Valeriano, Roberto De Virgilio, Riccardo To...
Abstract. We have recently witnessed a growing interest in self organising systems, both in research and in practice. These systems re-organise in response to new or changing condi...
Stefanos Zachariadis, Cecilia Mascolo, Wolfgang Em...
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...