It is only in the last five years that researchers have begun to use disk-based search techniques on a large scale. The primary examples of its use come from symbolic algebra and...
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
— Inter-robot communication is essential if general purpose intelligent decentralized multiple-robot systems are to become a reality. Traditionally, explicit communication amongs...
The spread of fire is a complex phenomenon that many have tried to study over the years. As one can imagine, the spread of fire depends on many different variables such as the mate...
A new, formal, role-based, framework for modeling and analyzing both real world and artificial organizations is introduced. It exploits static and dynamic properties of the organiz...
Egon L. van den Broek, Catholijn M. Jonker, Alexei...