Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
In ubiquitous computing era, the notion of context-awareness will play an important role. An application should be aware of its operating context for supporting and enriching huma...
Chip-multiprocessors are quickly gaining momentum in all segments of computing. However, the practical success of CMPs strongly depends on addressing the difficulty of multithread...
Sewook Wee, Jared Casper, Njuguna Njoroge, Yuriy T...
Abstract. So far, the main focus of research on adaptability in multiagent systems (MASs) has been on the agents’ behavior, for example on developing new learning techniques and ...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...
Air pollution, traffic congestion, stress and accidents are common features of today’s road transportation experience. New approaches to improving the efficiency and safety of t...
Vinny Cahill, Aline Senart, Douglas C. Schmidt, St...