Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
One day, you suddenly find that a private key corresponding to your Identity is up for sale at e-Bay. Since you do not suspect a key compromise, perhaps it must be the PKG who is...
Abstract. This paper presents the creation of 3D statistical shape models of the knee bones and their use to embed information into a segmentation system for MRIs of the knee. We p...
Jurgen Fripp, Pierrick Bourgeat, Andrea J. U. Mewe...
This paper shows the use of protocols dynamically generated for a particular network environment and an application’s requirements. We have developed a novel system called PNUT (...
In situations where self-interested agents interact repeatedly, it is important that they are endowed with negotiation techniques that enable them to reach agreements that are pro...
Sarvapali D. Ramchurn, Carles Sierra, Lluis Godo, ...