Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
This paper presents an approach to automated negotiation between agents which attempts to combine the advantages of a co-operative value adding approach, with the reality that neg...
In this paper, we present a general computational and operational framework for the Fuzzy Cognitive Network (FCN), which is a direct extension of Fuzzy Cognitive Maps (FCM). The pr...
Theodoros L. Kottas, Yiannis S. Boutalis, Manolis ...
The completeness (i.e. confluent and terminating) property is an important concept when using a term rewriting system (TRS) as a computational model of functional programming lang...
Abstract thinking is a vital skill when learning computer science. Object technology and the concepts it is based upon make this skill even more crucial. However, previous research...