Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
When implementing an application system in a distributed computing environment, several architectural questions arise such as, how and where computing resources are distributed, a...
Fuzzy Logic has traditionally found an application in control theory, systems analysis, and artificial intelligence [9] [7]. However, it is very difficult to apply it to tradition...
Luigi Benedicenti, Giancarlo Succi, Tullio Vernazz...
In this paper we introduce a new underlying probabilistic model for principal component analysis (PCA). Our formulation interprets PCA as a particular Gaussian process prior on a ...
Abstract. In this paper we investigate the transformation of OWL-S process models to ISPL - the system description language for MCMAS, a symbolic model checker for multi agent syst...