Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Many of today's CBR systems are passive in nature: they require human users to activate them manually and to provide information about the incoming problem explicitly. In this...
This paper describes a method and system for integrating machine learning with planning and data visualization for the management of mobile sensors for Earth science investigation...
Robert A. Morris, Nikunj C. Oza, Leslie Keely, Eli...
Many of our daily activities are supported by behavioural goals that guide the selection of actions, which allow us to reach these goals effectively. Goals are considered to be im...
Raymond H. Cuijpers, Hein T. van Schie, Mathieu Ko...