This chapter covers extensions of the basic description logics introduced in Chapter 2 by very expressive constructs that require advanced reasoning techniques. In particular, we ...
Abstract. When model checking a software component, a model of the environment in which that component is supposed to run is constructed. One of the major threats to the validity o...
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
A concept of linearly graded statistical models for analogue performance evaluation is proposed and a suitable technique for automatic generation of analogue performance models us...
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the network...
Christian Borgs, Jennifer T. Chayes, Constantinos ...