The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Abstract. We present a formal model of negotiation between autonomous agents. The purpose of the negotiation is to reach an agreement about the provision of a service by one agent ...
Carles Sierra, Peyman Faratin, Nicholas R. Jenning...
This paper presents a methodology for agent-oriented analysis and design. The methodology is general, in that it is applicable to a wide range of multi-agent systems, and comprehe...
Michael Wooldridge, Nicholas R. Jennings, David Ki...