g higher levels of abstraction with automated downward transformations has always been the way to go, as long as the engineers who do the actual work are th the abstractions. A dev...
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
We examine the problem of self-adaptation in game-playing agents as the game requirements evolve incrementally. The goal of our current work is to develop an interactive environme...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
In the context of cognitive agent programming frameworks, a main research effort accounts for exploiting goalorientation for specifying and enacting agent interaction. Existing re...
Michele Piunti, Alessandro Ricci, Lars Braubach, A...
Abstract— Powerline communications (PLC) are receiving special attention since they use an already available and ubiquitous infrastructure. The main standard for PLC home network...