This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Peer-to-peer file sharing networks have emerged as a new popular application in the Internet scenario. In this paper, we provide an analytical model of the resources size and of t...
Mauro Andreolini, Riccardo Lancellotti, Philip S. ...
Queueing networks are gaining attraction for the performance analysis of parallel computer systems. A Jackson network is a set of interconnected servers, where the completion of a...
Agent-based computing represents an exciting new synthesis both for Artificial Intelligence (AI) and, more generally, Computer Science. It has the potential to significantly impro...
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...