High-level controllers that operate robots in dynamic, uncertain domains are concerned with at least two reasoning tasks dealing with the effects of noisy sensors and effectors: T...
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
In this paper, we discuss our approach to constructing a dynamic and secure “Smart Home” environment and tackling the challenges associated with it. We envision a Smart Home a...
Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas...
Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are i...
A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the ...