Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...
In this paper we discuss how recent developments in argumentation frameworks, most notably Extended Argumentation Frameworks, can inform the representation of a body of case law u...
Abstract-- Existing high-dimensional motion planning algorithms are simultaneously overpowered and underpowered. In domains sparsely populated by obstacles, the heuristics used by ...
Nathan D. Ratliff, Matt Zucker, J. Andrew Bagnell,...
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...