This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
There are many machine learning algorithms currently available. In the 21st century, the problem no longer lies in writing the learner, but in choosing which learners to run on a ...
We study the generalization of covering problems to partial covering. Here we wish to cover only a desired number of elements, rather than covering all elements as in standard cov...
Group facilitation is an important element of group approaches to Requirements Engineering (RE). The facilitation in ‘traditional’ face-to-face groups is challenged by the inc...
Daniela E. Damian, Mildred L. G. Shaw, Armin Eberl...
This article focuses on the application of artificial evolution to the synthesis of analog active filters. The main objective of this research is the achievement of a new class of...