In the development of virtual communities, a new phenomenon of virtual money is observed and presented high importance to both e-commerce and e-society fields. This paper, as a pi...
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Frequently, it is observed that the sequence of indexes generated by a vector quantizer (VQ) contains a high degree of correlation, and, therefore, can be further compressed using ...
Agent-oriented software is promising improvements especially for the design of distributed systems. But currently, there is a substantial gap between the massive number of publica...
There exist a number of reinforcement learning algorithms which learn by climbing the gradient of expected reward. Their long-run convergence has been proved, even in partially ob...