This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
We consider repairable reliability systems with m components, the lifetimes and repair times of which are independent. The l-th component can be either in the failure state 0 or i...
Using model checking to verify that interaction protocols have given properties is widely recognized as an important issue in multiagent systems where autonomous and heterogeneous ...
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
While virtual worlds have evolved to provide a good medium for social communication, they are very primitive in their social and affective communication design. The social communic...