Most of the available knowledge management systems pay little attention to two important aspects: the need of supporting emerging communities of interest together with the officia...
Alessandra Agostini, Sara Albolino, Giorgio De Mic...
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
The cache hierarchy of state-of-the-art—especially multicore—microprocessors consumes a significant amount of area and energy. A significant amount of research has been devo...
During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...