In this paper, we compare two scheduling procedures designed to minimize setup costs for a make-to-order electronics manufacturing. While setup costs are important, quick response...
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
Mobile application components can be effectively and uniformly modeled in terms of autonomous agents moving across different context during execution. In this paper, we introduce a...
Giacomo Cabri, Letizia Leonardi, Marco Mamei, Fran...
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...