Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
We present the system LAP (Learning Abductive Programs) that is able to learn abductive logic programs from examples and from a background abductive theory. A new type of induction...
Most mainstream system programming languages provide support for builtin types, and extension mechanisms through userdefined types. They also come with a notion of constant expre...
The educational literature recognizes that people go through a number of stages in their intellectual development. During the first stage, called received knowledge or dualism, p...
— This paper describes a research experiment carried out at the University of Catania, aiming at testing and evaluating the applicability of the Erlang language in programming mu...