In this paper we propose an agent-based model of evolutionary algorithms (EAs) which extends seamlessly from concurrent single-host to distributed multi-host installations. Since ...
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
In this paper, we study the important issues in the design of an efficient WIreless real-time visual SurveillancE System (WISES). Two important considerations are to minimize: (1)...
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...