Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Abstract. Usually, MAS design and implementation involves a coordination model that structures agent interactions and an infrastructure in charge of enacting it. We propose the ter...
Mobile application components can be effectively and uniformly modeled in terms of autonomous agents moving across different context during execution. In this paper, we introduce a...
Giacomo Cabri, Letizia Leonardi, Marco Mamei, Fran...
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...