— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Abstract. Creating case representations in unsupervised textual case-based reasoning applications is a challenging task because class knowledge is not available to aid selection of...
Stewart Massie, Nirmalie Wiratunga, Susan Craw, Al...
The core goal of resource management is to establish a mutual agreement between a resource producer and a resource consumer by which the provider agrees to supply a capability tha...
Behnaz Pourebrahimi, Koen Bertels, G. M. Kandru, S...
— We describe a system in which autonomous robots assemble two-dimensional structures out of square building blocks. A fixed set of local control rules is sufficient for a grou...
Justin Werfel, Yaneer Bar-Yam, Daniela Rus, Radhik...
— In this paper we present a simple and stateless broadcasting protocol called Dynamic Delayed Broadcasting (DDB) which allows locally optimal broadcasting without any prior know...