Agents that operate in a real-world environment have to process an abundance of information, which may be ambiguous or noisy. We present a method inspired by cognitive research tha...
Maria E. Niessen, Gert Kootstra, Sjoerd de Jong, T...
Scenarios such as online banking, mobile payment systems, stock trading, selling merchandise, and a host of other applications that need a high level of security have moved from th...
Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi S...
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
cally Refining Abstract Interpretations Bhargav S. Gulavani1 , Supratik Chakraborty1 , Aditya V. Nori2 , and Sriram K. Rajamani2 1 IIT Bombay 2 Microsoft Research India Abstract. A...
Bhargav S. Gulavani, Supratik Chakraborty, Aditya ...
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...