This paper describes how cognitive modeling can be exploited in the design of software agents that support naval training sessions. The architecture, specifications, and embedding...
Willem A. van Doesburg, Annerieke Heuvelink, Egon ...
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
The Web Service paradigm is currently considered as the most promising and rapidly evolving technology for developing applications in open, distributed and heterogeneous environme...
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...