This paper presents a solution to the problem of pattern formation on a grid, for a group of identical autonomous robotic agents, that have very limited communication capabilities...
Noam Gordon, Israel A. Wagner, Alfred M. Bruckstei...
We show that, in the ideal-cipher model, triple encryption (the cascade of three independently-keyed blockciphers) is more secure than single or double encryption, thereby resolvin...
The application of Artificial Intelligence described in this article is intended to resolve the issue of speculation on the stock market. Genetic Algorithms is the technique that ...
David de la Fuente, Alejandro Garrido, Jaime Lavia...
Abstract. Depth-first proof-number (df-pn) search is a powerful member of the family of algorithms based on proof and disproof numbers. While df-pn has succeeded in practice, its t...
Boyer-Moore-Horspool (BMH) algorithm is commonly used to solve text searching problems. In this paper is used to solve the constraint subset of XPath queries offering effective alg...