An adaptation contract describes composition constraints and adaptation requirements among several services which were not initially built to interoperate with each other. The man...
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
We present a novel use of ordinal evaluation (OrdEval) algorithm as a promising technique to study various marketing phenomena. OrdEval algorithm has originated in data mining and ...
Designing efficient bidding strategies for sequential auctions remains an important, open problem area in agent-mediated electronic markets. In existing literature, a variety of bi...
We study a spectrum sharing problem in an unlicensed band where multiple systems coexist and interfere with each other. Due to asymmetries and selfish system behavior, unfair and...