End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Automated negotiation is an important applying field of agent theory and technology. For the current agent theoretical models have some troubles in explaining the agent's nego...
The focus of this paper is to show that the E-C-A paradigm offers an excellent approach for specifying the behavior of context-aware information push services. Such a service enabl...