The security threat posed by malware in mobile wireless networks can be countered through immunization using security patches. The distribution of patches however consumes bandwidt...
In this paper we present our bio-mimetic artificial arm and the simulation results on its low level control system. In accordance with the general view of the Biorobotics field w...
In this paper we shall describe a very natural extension of MV-algebras, the divisible MV-algebras (DMV). Such algebraic structures will be used to give a formal description of ru...
In a hierarchical structure, an entity has access to another if and only if the former is a superior of the later. The access control scheme for a hierarchy represented by a partia...
Controlled natural languages (CNL) and computational semantics in general do not address word sense disambiguation, i.e., they tend to interpret only some functional words that are...