The dynamic changes of the topology caused by the movement of nodes makes routing become one of the key problems in the mobile Ad Hoc Networks (MANET). So how to optimize routing b...
About fifteen years of e-government research (EGR) lead to a research field that is looking forward to define an identity as a proper and autonomous scientific discipline. This pap...
In this paper, we propose a representation of excuses in the context of multiagent systems. We distinguish five classes of excuses, taking as starting point both jurisprudential an...
Guido Boella, Jan Broersen, Leendert van der Torre...
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...