This paper describes the general architecture of generation in the ACORDproject. The central module of this architecture is a planning component, which allows to plan single sente...
Abstract-- This work furthers the understanding of modularity in grammar-based genetic programming approaches by analyzing how different grammars may be capable of producing the sa...
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
A navigation functions' based methodology, established in our previous work for centralized multiple robot navigation, is extended to address the problem of decentralized nav...
Dimos V. Dimarogonas, Savvas G. Loizou, Kostas J. ...
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...