Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
In the field of multiagent systems (MAS), the computational models of trust and reputation have attracted increasing interest since electronic and open environments became a reali...
The efficient simulation of multi-agent systems presents particular challenges which are not addressed by current parallel discrete event simulation (PDES) models and techniques. ...
Michael Lees, Brian Logan, Rob Minson, Ton Oguara,...
The recent and unprecedented surge of public interest in peer-to-peer file sharing has led to a variety of interesting research questions. In this paper, we will address the ince...
Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, ...