Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Web based systems have been shown to be useful tools for supporting educational communication for teachers and students. In this paper we present such a system, which is an Integr...
Abstract. This paper presents a general multi-agent architecture for the management of businessprocesses,and an agent designthat has been implemented within such a system. The auto...
Timothy J. Norman, Nicholas R. Jennings, Peyman Fa...
Allowing higher-priority requests to preempt ongoing disk IOs is of particular benefit to delay-sensitive multimedia and real-time systems. In this paper we propose Semi-preempti...
Zoran Dimitrijevic, Raju Rangaswami, Edward Y. Cha...
Abstract-- This paper extends the method of virtual constraints and hybrid zero dynamics, developed for rigid robots with a single degree of underactuation, to MABEL, a planar bipe...
Koushil Sreenath, Hae-Won Park, Ioannis Poulakakis...