This paper presents results, outcomes and conclusions from a series of Human Robot Interaction (HRI) trials which investigated how a robot should approach a human in a fetch and c...
Michael L. Walters, Kerstin Dautenhahn, Sarah N. W...
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
The search for the Holy Grail in achieving interoperability of business processes, services and semantics continues with every new type or search for the Silver Bullet. Most approa...
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...