Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for sy...
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv...
: Despite the growing interest in Interactive Storytelling (IS), there have been only a small number of implemented demonstrators and few have attempted at developing a re-usable I...
: This chapter presents the problematic of the distributed systems supervision through a comprehensive state-of-the-art. Issues are illustrated with a case study about an innovativ...
We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforce...
Ricardo Corin, Sandro Etalle, J. I. den Hartog, Ga...
: Component retrieval, about how to locate and identify appropriate components, is one of the major problems in component reuse. It becomes more critical as more reusable component...