Although distributed Group Support Systems (GSS) are getting popular, there are still some limitations. One of the limitations is few substitutions for face-to-face (FTF) interact...
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
Agents or agent teams deployed to assist humans often face the challenges of monitoring the state of key processes in their environment (including the state of their human users t...
Pradeep Varakantham, Rajiv T. Maheswaran, Milind T...