In this paper we investigate some properties and algorithms related to a text sparsification technique based on the identification of local maxima in the given string. As the numb...
Pierluigi Crescenzi, Alberto Del Lungo, Roberto Gr...
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
This paper proposes the use of reliable group communication as a complement to traditional asynchronous messaging in multi-agent systems. In particular, the mechanism of message p...
In Agent Mediated Electronic Commerce, autonomy of agents is an important property. On one hand, it has to be favored to make the agents able to determine and adapt their own goal...
One of the benefits of goal-oriented requirements engineering is the possibility of conducting formal analysis in order to evaluate alternative solutions of goal models. Superfici...