Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Website success hinges on how credible the consumers consider the information on the website. Unless consumers believe the website's information is credible, they are not lik...
Forward pruning, or selectively searching a subset of moves, is now commonly used in game-playing programs to reduce the number of nodes searched with manageable risk. Forward pru...
In a market-based scheduling mechanism, the allocation of time-specific resources to tasks is governed by a competitive bidding process. Agents bidding for multiple, separately al...
Jeffrey K. MacKie-Mason, Anna Osepayshvili, Daniel...
—This paper describes a methodology based on Answer Set Programming (ASP) to work with incomplete geographic data. Source geographic data which describes a risk zone is translate...