We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
We show how quantified constraints expressed in a sub-language of first-order logic, againstashareddatamodelthatisfreetoevolve, provideanexcellentwayof transporting domain-specific...
Kit-ying Hui, Peter M. D. Gray, Graham J. L. Kemp,...
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
There are examples of robotic systems in which autonomous mobile robots self-assemble into larger connected entities. However, existing systems display little or no autonomous cont...
Anders Lyhne Christensen, Rehan O'Grady, Marco Dor...