This paper describes and evaluates three methods for coordinating multiple agents. These agents interact in two ways. First, they are able to work together to achieve a common poo...
Steve A. Chien, Anthony Barrett, Tara A. Estlin, G...
We describe a VRML/Java-based virtual environment that is populated with heterogeneous articulated agents. In this simulated environment, agents compete for collecting certain obj...
This work studies the interaction of Web proxy cache coherency and replacement policies using trace-driven simulations. We specifically examine the relative importance of each typ...
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Abstract-- The capabilities of embedded devices such as smartphones are steadily increasing and provide the great flexibility of data access and collaboration while being mobile. F...