— The advent of ubiquitous computing has revolutionized distributed Multi-agent systems (MAS). Consequently, there are many software projects focusing on MASs. However, its succe...
Abstract— Server providers that support e-commerce applications as a service to multiple e–commerce websites traditionally use a tiered server architecture. This architecture i...
Daniel A. Villela, Prashant Pradhan, Dan Rubenstei...
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
— This paper is concerned with modeling, analysis and optimization/control of occupancy evolution in a large building. The main concern is efficient evacuation of a building in ...
Kun Deng, Wei Chen, Prashant G. Mehta, Sean P. Mey...
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...