Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Abstract. It is necessary to analyze an image from CT or MR and then to segment an image of a certain organ from that of other tissues for 3D (ThreeDimensional) visualization. Ther...
A gradient-based method for both symmetric and asymmetric multiagent reinforcement learning is introduced in this paper. Symmetric multiagent reinforcement learning addresses the ...
Source code clones are copies or near-copies of other portions of code, often created by copying and pasting portions of source code. This working session is concerned with buildi...
Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Y...
This paper presents a new GUI architecture for creating advanced interfaces. This model is based on a limited set of general principles that improve flexibility and provide capabi...