We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
In this paper, we give an overview on some algorithms for learning automata. Starting with Biermann's and Angluin's algorithms, we describe some of the extensions caterin...
In this paper we consider how a BDI agent might determine its best course of action. We draw on previous work which has presented a model of persuasion over action and we discuss ...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...
Interface automata provide a formalism capturing the high level interactions between software components. Checking compatibility, and other safety properties, in an automata-based ...
Michael Emmi, Dimitra Giannakopoulou, Corina S. Pa...
This paper proposes a simple equalizer for a recent multicarrier block transmission scheme which pads zeros (as opposed to a cyclic prefix) in each transmitted block. In the abse...
Bertrand Muquet, Marc de Courville, Pierre Duhamel...