This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
Abstract—Cross-layer routing and scheduling algorithms design for wireless backhaul mesh network has attracted much research interest recently. The network is expected to support...
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
— This paper addresses the problem of designing a power-aware Multiple Access Control (MAC) protocol for Multihop Wireless Networks (MHWN). The problem is formulated as a cross l...
Abstract. Web applications represent an important category of applications that owe much of their popularity to the ubiquitous accessibility using standard web browsers. The comple...