Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
We coordinate in discrete time the interaction of two heterogeneous groups of mobile agents: a group of ground vehicles (ugvs) and a group of aerial vehicles (uavs). The ground ag...
Existing approaches to knowledge representation and reasoning in the context of open systems either deal with "objective" knowledge or with beliefs. In contrast, there ha...
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...