Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal p...
In this paper we propose a computational model for human-agent and agent-agent conversation. This model has two fundamental characteristics: (1) it takes into account the implicit ...
—This paper presents a middleware platform for the provision of services in disconnected MANETs, focusing on service invocation. This middleware exploits content-based communicat...
Reliable many-to-many multicasting of messages is an integral part of group communication systems. Such systems typically employ a reliable multicast protocol that operates below ...
Ruppert R. Koch, Louise E. Moser, P. M. Melliar-Sm...
Abstract. We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-s...