A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Abstract. This paper presents the capabilities offered by MultiAgent System technology in the operation of a Microgrid. A Microgrid is a new type of power system, which is formed b...
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Abstract-- Computational modellers are becoming increasingly interested in building large, eclectic, biological models. These may integrate nervous system components at various lev...
Benjamin Mitchinson, Tak-Shing Chan, Jonathan M. C...
A low-cost active vision head with ten degrees of freedom is presented that has been build from off-the-shelf parts. To obtain high resolution depth information of fixated objects ...