Merging operators try to define the beliefs of a group of agents according to the beliefs of each member of the group. Several model-based propositional belief merging operators h...
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
In the multi-armed bandit (MAB) problem there are k distributions associated with the rewards of playing each of k strategies (slot machine arms). The reward distributions are ini...
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
In the knowledge economy, a firm's intellectual capital represents the only sustainable source of competitive advantage. Intellectual capital manifests itself, predominantly,...