We provide technical details about the software and hardware architecture of SETA, a prototype toolkit for the creation of Web stores which personalize the interaction with custom...
Liliana Ardissono, Anna Goy, Giovanna Petrone, Mar...
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
Abstract. Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The natural implementation for...
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
A prerequisite of participating in an enterprise system is the ability to cope with the rigorous demands experienced within the system. In order to cope with these demands, a numb...