As ubiquitous computing technology migrates into the home environment, there has been a concurrent effort to allow users to build and customize such technologies to suit their own...
Khai N. Truong, Elaine M. Huang, Molly M. Stevens,...
We propose an adaptive 1-to-many negotiation strategy for multiagent coalition formation in dynamic, uncertain, real-time, and noisy environments. Our strategy focuses on multi-is...
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
The concept of typed attributed graph transformation is most significant for modeling and meta modeling in software engineering and visual languages, but up to now there is no ade...
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...