An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
In this paper, we describe our experience with the design and implementation of an embodied conversational agent (ECA) that converses with users in order to change their dietary b...
Fiorella de Rosis, Nicole Novielli, Valeria Carofi...
In this paper, we review the definition of a variant of TCP, called SmoothTCP, and describe one of its versions which uses ICMP-SQ messages as its primary control metric. This vers...
- Current wireless systems are called vendor-central systems because, users should subscribe to a service provider (vendor) and receive the service through the spectrum assigned to...
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...