Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...
— In this paper we provide experimental results and extensions to our previous theoretical findings concerning the combination of forecasts that have been diversified by three ...
In this paper we investigate the emergence of communication in competitive multi-agent systems. A competitive environment is created with two teams of agents competing in an explo...
Michelle McPartland, Stefano Nolfi, Hussein A. Abb...
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...