Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
This paper presents a control strategy for manipulation of exible objects by multiple robot arms. The control policy developed in this paper for exible objects is based on a contr...
With web services emerging as a promising technology for supporting open and dynamic business processes, it is witnessed that standards for business process specification in the c...
This paper studies adaptive bilateral negotiation between software agents in e-commerce environments. Specifically, we assume that the agents are self-interested, the environment...