Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
1 In many of today’s industry, knowledge is considered a strategic tool; however, knowledge is involved in so many services with so many facets that it is very complex to effecti...
Fabrice Alizon, Steven B. Shooter, Timothy W. Simp...
Rapidly changing environments such as robots, sensor networks, or medical services are emerging. To deal with them, DBMS should persist sensor data streams instantaneously. To achi...
Agents can freely migrate among open MASs in order to obtain resources or services not found locally. In this scenario, agent actions should be guided for avoiding unexpected behav...
Due to the rapid acceptance of web services and its fast spreading, a number of mission-critical systems will be deployed as web services in next years. The availability of those ...
Jorge Salas, Francisco Perez-Sorrosal, Marta Pati&...