The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
Abstract We present an extensible encoding of object-oriented data models into higherorder logic (HOL). Our encoding is supported by a datatype package that leverages the use of th...
The aim of this study is to develop a computational method of discourse analysis based on corpus semantics. The objective is to achieve an accurate understanding of the debate cont...
In this paper, we discuss various aspects of the design, implementation, and use of JAPROSIM which is a general purpose discrete event simulation framework based on the Java progr...
Fuzzy cognitive map is an approach to knowledge representation and inference; it emphasizes the connections of concepts as basic units for storing knowledge, and the structure that...