In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
Multi-agent systems can be viewed as object-oriented systems in which their entities show an autonomous behavior. If objects could acquire such skill in a flexible way, agents coul...
This chapter presents an approach for texture and object recognition that uses scale- or affine-invariant local image features in combination with a discriminative classifier. Text...
While computers have defeated the best human players in many classic board games, progress in Go remains elusive. The large branching factor in the game makes traditional adversar...
Christopher Fellows, Yuri Malitsky, Gregory Wojtas...
Reasoning on the Web is gaining in importance because of emerging Web applications such as contextadaptive Web systems (e.g. eLearning, recommender, personalised (multi-)media, an...