The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
Mixed-Initiative approaches to Planning and Scheduling are being applied in different real world domains. While several recent successful examples of such tools encourage a wider ...
Design and implementation of distributed algorithms often involve many subtleties due to their complex structure, non-determinism, and low atomicity as well as occurrence of unanti...
Ananda Basu, Borzoo Bonakdarpour, Marius Bozga, Jo...
E-commerce web sites that sell highly customized products tend to be very complex in terms of the underlying logical model of the customization process. We present a systematic ap...
Andrea Lombardoni, Moira C. Norrie, Nadir Weibel, ...
The term social cognition is used in the psychology and organizational literatures to denote many different manifestations of the mental representations and processes that underli...