We provide a method for deciding the insecurity of cryptographic protocols in presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-call...
In this paper, we describe the development of a virtual human to be used for training applications in the field of cardiac emergencies. The system integrates AI techniques for sim...
Abstract. Multi-agent systems considered in the paper consist of a finite number of agents, positions of which can be changed by system actions, and of an evaluation function whic...
Crossover operators that preserve common components can also preserve representation level constraints. Consequently, these constraints can be used to beneficially reduce the sea...
This is an account of the development of the languages Modula-2 and Oberon. Together with their ancestors ALGOL 60 and Pascal they form a family called Algollike languages. Pascal...