Design diversity has long been used to protect redundant systems against common-mode failures. The conventional notion of diversity relies on "independent" generation of...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
We build on recent work on argumentation frameworks for generating desires and plans. We provide a rich instantiDung's abstract argumentation framework for (i) generating con...
We build on recent work on argumentation frameworks for generating desires and plans. We provide a rich instantiDung's abstract argumentation framework for (i) generating con...
: There is a rich literature of approaches to image feature extraction in computer vision. Many sophisticated approaches exist for low- and high-level feature extraction but can be...
Mark S. Nixon, Cem Direkoglu, Xin U. Liu, David J....