Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
Grid technology has been widely used for large-scale computational problems, but it also provides a framework for running a big number of smallsized processes. Moreover, these proc...
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...