For artificial entities to achieve high degrees of autonomy they will need to display appropriate adaptability. In this sense adaptability includes representational flexibility gu...
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
In February 2002, more than 50 leaders in the information assurance field warned the President of the United States of a national strategic vulnerability in the country’s inform...
We view the task of change detection as a problem of object recognition from learning. The object is defined in a 3D space where the time is the 3rd dimension. We propose two com...
This contribution presents the concept and analyses the path of diffusion of an innovative publishing idea that originated in one speciality in physics and is now about to spread ...
Claus Dalchow, Michael Nentwich, Patrick Scherhauf...