The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
CDMA2000, WCDMA and WiMAX are three widely used 3G technologies. Since they share the same goal, which is to provide broader coverage and higher throughput in 3G networks, an impar...
Abstract. This paper presents J-MADeM, a new market-based multi-agent approach devoted to perform social simulations with BDI agents. J-MADeM is available as an open-source library...
Francisco Grimaldo, Miguel Lozano, Fernando Barber
Abstract Following earlier work demonstrating the utility of Orc as a means of specifying and reasoning about grid applications we propose the enhancement of such specifications w...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick