Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
: In [SH08] we introduced a method for the calculation and visualization of the whole TMA solution space. So, not only the best TMA solution, but also other solution areas with hig...
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...