The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Traditional web-based services that require users to browse via documents and fill out forms, are difficult to use with mobile devices. Moreover, as the web paradigm assumes activ...
Jussi Saarinen, Tommi Mikkonen, Sasu Tarkoma, Jani...
In order to inform the design of technology support and new procedural methodsfor softwaredesign,we analyzed the content of real design meetingsin threeorganizations, focusing in ...
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...