Abstract. Most hardware/software codesigns of Elliptic Curve Cryptography only have one central control unit, typically a 32 bit or 8 bit processor core. With the ability of integr...
Vivid agents [48] are software-controlled systems whose state comprises the mental components of knowledge, perceptions, tasks, and intentions, and whose behaviour is represented ...
Abstract Asynchronous invocations are an important functionality in the context of distributed object frameworks, because in many situations clients should not block during remote ...
Wireless technologies are poised to bring major changes in the information infrastructure, transforming communications and facilitating information retrieval. Over the next severa...
We explore the computational power of networks of small resource-limited mobile agents. We define two new models of computation based on pairwise interactions of finite-state ag...