Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Recent advances in computer graphics, particularly in real-time rendering, have caused major improvements in 3D graphics and rendering techniques used in interactive entertainment...
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Abstract. Research in many fields of AI, such as distributed planning and reasoning, agent teamwork and coalition formation, cooperative problem solving and action theory has adva...