In highly dynamic and heterogeneous environments such as mobile and ubiquitous computing, software must be able to adapt at runtime and react to the environment. Furthermore it sho...
This paper discusses an efficient implementation of the multiplexing protocol H.223, which is an important part of 3G-324M protocol stack required for 3G mobile multimedia communic...
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
This paper presents a model of autonomy called autonomy with regard to an attribute applicable to cognitive and not cognitive artificial agents. Three criteria (global / partial, ...
Abstract. Isaac is a rule-based visual language for mobile robots using evidential reasoning and a fuzzy inference engine. A prototype inference engine for Isaac has been implement...