This article presents a study of online digital library (DL) uses, based on three data sources (online questionnaire, Internet traffic data and interviews). We show that DL users d...
Houssem Assadi, Thomas Beauvisage, Catherine Lupov...
The article presents an approach to model based testing of complex systems based on a generalization of finite state machines (FSM) and input output state machines (IOSM). The app...
Victor V. Kuliamin, Alexandre Petrenko, Nick V. Pa...
Abstract. In open agent societies, communication protocols and strategies cannot be assumed to always match perfectly, because they are typically specified by different designers...
Ulrich Endriss, Wenjin Lu, Nicolas Maudet, Kostas ...
Abstract. Complexity in software design refers to the difficulty in understanding and manipulating the set of concepts, models and techniques involved in the design process. Agents...
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...