Agent theories and agent programs are two very different styles of specification of agent behavior. The former are declarative in nature, while the latter have an imperative fl...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Drugs and other chemical compounds are often modeled as polygonal shapes, where each vertex represents an atom of the molecule, and covalent bonds between atoms are represented by...
Yih-En Andrew Ban, Sergei Bespamyatnikh, Nabil H. ...
Communication between players in networked computer games is often inadequately implemented. The games do not exploit the full potential of using different forms of communication ...
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...