The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Traditional email clients are built with a “one-touch” model in mind that assumes an immediate action is performed once an email is read. However, some emails require a follow...
Abstract. The complexity of distributed algorithms, such as state machine replication, motivates the use of formal methods to assist correctness verification. The design of the for...
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Abstract. There is growing trend to unify user-to-user messaging systems to allow message exchange, independent of time, place, protocol, and end-user device. Building gateways to ...