The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Multi-agent systems are open and extensible systems that allow for the deployment of autonomous and proactive software components. This paper describes how a multi-agent architectu...
Robin Strahan, Conor Muldoon, Gregory M. P. O'Hare...
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Distributed systems comprised of autonomous self-interested entities require some sort of control mechanism to ensure the predictability of the interactions that drive them. This ...
Felipe Rech Meneguzzi, Simon Miles, Michael Luck, ...