Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
By sharing data regarding the sensations experienced by individuals, as well as by sharing their knowledge, we are readily able to communicate with each other, and there are possi...
Nowadays, many applications need data modeling facilities for the description of complex objects with spatial and/or temporal facilities. Responses to such requirements may be fou...
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
Intelligence, collaboration and mobility are the main important features in designing agents for electronic commercial systems. But very few systems permit to implement agents whi...