This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Modern distributed systems that have to avoid performance degradation and system overload require several runtime management decisions for load balancing and load sharing, overloa...
Building dependable distributed systems using ad hoc methods is a challenging task. Without proper support, an application programmer must face the daunting requirement of having ...
Jennifer Ren, Michel Cukier, Paul Rubel, William H...
Recently, many works have appeared dealing with the distributivity of fuzzy implications over t-norms, tconorms and uninorms (see [2, 3, 4, 5, 12, 13, 14]). These equations have a...
Abstract— A distributed control law that guarantees connectivity maintenance in a network of multiple mobile agents is presented. The control law respects the limited sensing cap...