We consider the problem of how an agent's knowledge can be updated. We propose a formal method of knowledge update on the basis of the semantics of modal logic S5. In our met...
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
Mission critical applications and legacy systems may be difficult to revise and rebuild, and yet it is sometimes desirable to retrofit their user interfaces with new collaborative...
Li-Te Cheng, Steven L. Rohall, John F. Patterson, ...
Software has migrated from large mainframe based support to personal computer support and more recently to groupware or, more specifically, group support systems (GSS). GSS produc...
Michiel van Genuchten, Douglas R. Vogel, Jay F. Nu...
Abstract—With the growing complexity of software applications, there is an increasing demand for solutions to distribute workload into server pools. Grid Computing provides power...
Xing Zhou, Thomas Dreibholz, Martin Becke, Jobin P...