Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...