Abstract. Graph constraints and application conditions are most important for graph grammars and transformation systems in a large variety of application areas. Although different...
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
Abstract—We present a new approach to providing soft realtime guarantees for Belief-Desire-Intention (BDI) agents. We define what it means for BDI agents to operate in real time...
Konstantin Vikhorev, Natasha Alechina, Brian Logan
Circuit interconnect has become a substantial obstacle in the design of high performance systems. In this paper we explore a new routing paradigm that strikes at the root of the i...
We established an interdisciplinary, intergenerational collaboration in the fall of 1995, between the University of New Mexico's Computer Science Department, the College of E...
Allison Druin, Jason Stewart, David Proft, Benjami...