We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
Model-based approaches in the UML/MOF technological space and ontology-based approaches in the OWL technological space both support conceptual modeling using different kinds of rep...
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
This paper studies the aggregation of predictions made by tree-based models for several perturbed versions of the attribute vector of a test case. A closed-form approximation of t...
Population size plays a major role in determining the performance of any biometric authentication system, particularly when such systems are used for civilian applications. In thi...