This paper describes a Rule Based Service Level Agreement language called RBSLA which is based on RuleML. With this language SLAs can be implemented in a machine readable syntax w...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Abstract— We describe an autonomous robotic system capable of navigating through an office environment, opening doors along the way, and plugging itself into electrical outlets ...
Wim Meeussen, Melonee Wise, Stuart Glaser, Sachin ...
In a combined negotiation in e-commerce, the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are inde...
Typically, autonomous believable agents are implemented using static, hand-authored reactive behaviors or scripts. This hand-authoring allows designers to craft expressive behavio...
Peng Zang, Manish Mehta, Michael Mateas, Ashwin Ra...