At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
Call graphs are commonly used as input for automatic clustering algorithms, the goal of which is to extract the high level structure of the program under study. Determining the ca...
Derek Rayside, Steve Reuss, Erik Hedges, Kostas Ko...
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
Abstract. We introduce a new conceptual model for representing and designing Stochastic Local Search (SLS) algorithms for the propositional satisfiability problem (SAT). Our model...
This demo illustrates MAS-DisCoSim 4 PDP, a testbed environment for evaluating distributed multi-agent system solutions to pickup and delivery problems (PDPs). PDPs are well-studi...
Jelle Van Gompel, Bart Tuts, Rutger Claes, Mario C...