Abstract. Many autonomous agents operate in domains in which the cooperation of their fellow agents cannot be guaranteed. In such domains negotiation is essential to persuade other...
Carles Sierra, Nicholas R. Jennings, Pablo Noriega...
Abstract. In this paper, a new approach for retrieval from semistructured photographic collections is described. We have developed a retrieval model based on the Dempster-Shafer th...
Abstract. Pipeline morphing is a simple but e ective technique for recon guring pipelined FPGA designs at run time. By overlapping computation and recon guration, the latency assoc...
Wayne Luk, Nabeel Shirazi, Shaori Guo, Peter Y. K....
Abstract. This paper presents a new HOL4 formalization of the current ARM instruction set architecture, ARMv7. This is a modern RISC architecture with many advanced features. The f...
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...