Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
Abstract— In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, part...
Abstract. E-institutions are envisioned as facilities on the Internet for heterogeneous software agents to perform their interactions and thus forming truly open agent systems. We ...
Frank Dignum, Virginia Dignum, John Thangarajah, L...
Abstract. Introducing process orientation to overcome the functionaloriented organizational structure was the main concern within enterprises during the last decade to improve proc...
This work investigates the use of nonlinear dependencies in natural image sequence statistics to learn higher-order structures in natural videos. We propose a two-layer model that...