As robots become more common, it becomes increasingly useful for them to communicate and effectively share knowledge that they have learned through their individual experiences. L...
User-centered consultation systems can be viewed as systems with trust in the competence of the user, whereas conventional knowledge systems are often based on some mistrust. By o...
Georg Buscher, Joachim Baumeister, Frank Puppe, Di...
Recently various mathematical models have been proposed to model the signal attenuation obtained from Diffusion Weighted Magnetic Resonance Imaging (DW-MRI). Though effective to v...
Ritwik Kumar, Angelos Barmpoutis, Baba C. Vemuri, ...
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
: Decision-support systems that help solving problems in open and weak theory domains, i.e. hard problems, need improved methods to ground their models in real world situations. Mo...