ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
In this paper we present a prototype enterprise information run-time heavily inspired by the fundamental principles of autonomic computing. Through self-configuration, selfoptimi...
In this paper we show how to reduce downtime of J2EE applications by rapidly and automatically recovering from transient and intermittent software failures, without requiring appl...
George Candea, Emre Kiciman, Shinichi Kawamoto, Ar...
In this paper we present a framework to program autonomous robots in the declarative multi-paradigm language Curry. This is an experiment to use high-level declarative programming...
— This paper describes the prey-predator multiagent hich can be considered as an abstraction of more complex real-world models. Both the prey and the predators are considered as ...