There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Abstract. While Web Services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virt...
Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken ...
Supply chain management is a critically significant strategy that enterprises depend on in meeting the challenges of today's highly competitive and dynamic business environme...
Luis Rabelo, Magdy Helal, Chalermmon Lertpattarapo...
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
This paper describes the results of applying a modified version of hierarchical task-network (HTN) planning to the problem of declarer play in contract bridge. We represent inform...
Stephen J. J. Smith, Dana S. Nau, Thomas A. Throop