Therearemanymethodsfordetectingandmitigatingsoftware errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work ...
Westley Weimer, Stephanie Forrest, Claire Le Goues...
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
In this paper we attempt to give an account of reasoning with legal cases contextualised within a general theory of persuasion in practical reasoning. We begin by presenting our g...
Katie Greenwood, Trevor J. M. Bench-Capon, Peter M...
As computers become increasingly integral to daily life there is a need for computer scientists to focus on the user. This, in part, entails developing applications that have inte...
Gregory Smith, Laurian C. Vega, D. Scott McCrickar...
Abstract. We show how case bases can be compiled into Decision Diagrams, which represent the cases with reduced redundancy. Numerous computations can be performed efficiently on th...