In this paper we propose a computational model for human-agent and agent-agent conversation. This model has two fundamental characteristics: (1) it takes into account the implicit ...
In this note we consider design of an information provisioning subsystem for an agent-based virtual organization. Flexible delivery of information is based on matching of ontologi...
Maria Ganzha, Marcin Paprzycki, Maciej Gawinecki, ...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...