Advances in agent technologies have fueled interest towards combining agent-based techniques with tools from data mining. Furthermore, the advent of the ubiquitous computing paradi...
Petteri Nurmi, Michael Przybilski, Greger Lind&eac...
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
Assigning tasks to agents is complex, especially in highly dynamic environments. Typical protocol-based approaches for task assignment such as Contract Net have proven their value...
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Abstract--We present in this paper a case study of the probabilistic approach to model-based diagnosis. Here, the diagnosed system is a real-world electrical power system (EPS), i....
Ole J. Mengshoel, Mark Chavira, Keith Cascio, Scot...