We consider an extension of integer linear arithmetic with a "star" operator takes closure under vector addition of the solution set of a linear arithmetic subformula. We...
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
Human interpersonal face-to-face interaction can be considered in terms of successions of speech acts. These are utterances which contain an intention, and the act of creating an ...
Abstract-- This paper presents an artificial homeostatic system (AHS) devoted to the autonomous navigation of mobile robots, with emphasis on neuro-endocrine interactions. The AHS ...
We present a framework for automatically summarizing social group activity over time. The problem is important in understanding large scale online social networks, which have dive...