Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
This paper analyzes the simulation of Finite State mobile agent, which regards the migration, execution, and searching of the mobile agents as finite states. As the finite state mo...
A major setback for mobile agent technology is a lack of interoperability between systems for mobile agents which prevents them from reaching “critical mass”. In this paper, w...
actvoid.se Abstract. We describe how current work in Artificial Intelligence is using rigorous tools from information theory, namely information distance and experience distance to...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Lars Ol...
We study how synchronized gaze, gesture and speech rendered by an embodied conversational agent can influence the flow of conversations in multiparty settings. We review a computa...