Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
Power, energy, and thermal concerns have constrained embedded systems designs. Computing capability and storage density have increased dramatically, enabling the emergence of hand...
We consider apprenticeship learning—learning from expert demonstrations—in the setting of large, complex domains. Past work in apprenticeship learning requires that the expert...
ontingent abstraction for robust robot control Joelle Pineau, Geoff Gordon and Sebastian Thrun School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 This pape...
Joelle Pineau, Geoffrey J. Gordon, Sebastian Thrun