In this paper, we analyze the performance of a mobile agent based approach for discovering and allocating resources in large scale networks. We compare this approach with the trad...
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
—Bringing together heterogeneous computing devices and appliances gives rise to a spontaneous environment where resources exchange messages, such as a mobile phone telling the ca...
My doctoral research focuses on the usability and usage of new computer technology such as interactive systems that support the combination different input media such as voice, ge...