Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Note taking is a common way for physicians to collect information from their patients in medical inquiries and diagnoses. Many times, when describing the pathology in medical recor...
Rattapoom Waranusast, Peter Haddawy, Matthew N. Da...
In this demo, we present GENIUS, a tool that facilitates research in the area of bilateral multi-issue negotiation. It implements an open architecture allowing easy development an...
Koen V. Hindriks, Catholijn M. Jonker, Sarit Kraus...
The Automated Semantic Mapping of Ontologies with Validation (ASMOV) algorithm for ontology alignment was one of the top performing algorithms in the 2007 and 2008 Ontology Alignme...
Yves R. Jean-Mary, E. Patrick Shironoshita, Mansur...
Tools for automatic image understanding for managing operator workloads are essential. One common task for image analysts is the scanning large collections of real-time images loo...