Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
When dialogue systems, through the use of incremental processing, are not bounded anymore by strict, nonoverlapping turn-taking, a whole range of additional interactional devices ...
This paper deals with the competitive location problems using fuzzy sets. The basic notions on fuzzy optimization and linear programming using fuzzy sets are briefly reviewed. The ...
This paper contributes to the study of self-presentation in online dating systems by performing a factor analysis on the text portions of online profiles. Findings include a simil...
The paper establishes conditions which certify a local L2 gain for interconnections of locally stable systems. The approach involves improvements to local L2 gain estimation using ...