Most of existing crowd simulation algorithms focus on the moving trajectories of individual agents, while collective group formations are often roughly learned from video examples...
In this paper we demonstrate how genetic algorithms can be used to reverse engineer an evaluation function’s parameters for computer chess. Our results show that using an appropr...
Omid David-Tabibi, Moshe Koppel, Nathan S. Netanya...
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Abstract. In this paper we obtain some inequalities related to the generalized triangle and quadratic triangle inequalities for vectors in inner product spaces. Some results that e...
— In this study, synchronization phenomena observed in coupled polygonal oscillatory networks with frustration is investigated. We focus on the power consumption of coupling resi...