Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
Research in knowledge-based software engineering has led to advances in the ability to specify and automatically generate software. Advances in the support of upstream activities ...
Andreas Girgensohn, David F. Redmiles, Frank M. Sh...
: There is relatively little research on software Project Estimation and Measurement Systems (PEMS). Commercial PEMS vary in functionality and effectiveness. Their intended users t...
Abstract. The vision of agents working together on the Internet, in virtual organizations, is one that is increasingly common. However, one of the issues is the regulation of the p...
Carles Sierra, John Thangarajah, Lin Padgham, Mich...
This paper describes the design and evaluation of SouthamptonSCM, the runner-up in the 2005 International Trading Agent Supply Chain Management Competition (TAC SCM). In particula...
Minghua He, Alex Rogers, Xudong Luo, Nicholas R. J...