Abstract. Agent platforms designed for Internet-scale, open networks need scalable and secure location services for agents and services. The location service based on the Fonkey pu...
Benno J. Overeinder, Michel Oey, Reinier Timmer, R...
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
This paper analyses the collaborative design of a high-technology product, a neuromagnetometer used in the analysis of the activity of the human cortex. The producer, Neuromag Com...
In view of students' individual difference in the learning process, in this paper we propose a personalized learning system, to which intelligent Agent technique and case-bas...