We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational...
Qin Yin, Justin Cappos, Andrew Baumann, Timothy Ro...
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
Web Services integration using languages such as BPEL is to be applied not only on the Internet but also in pervasive networks using wireless mobile devices. However, in such a net...
Humanagents typically evolve a set of standard routines for carrying out often-repeated tasks. These routines effectively compile knowledgeabout howto carry out sets of interactin...
Many robotics tasks require a robot to share the same workspace with humans. In such settings, it is important that the robot performs in such a way that does not cause distress t...