Abstract— This paper discusses the design and current capabilities of a new software tool, dVC, capable of simulating planar systems of bodies experiencing unilateral contacts wi...
Stephen Berard, Jeffrey C. Trinkle, Binh Nguyen, B...
Explicit preferences on assumptions as used in prioritized circumscription [McCarthy, 1986; Lifschitz, 1985; Grosof, 1991] and preferred subtheories [Brewka, 1989] provide a clear...
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Software models provide independent perspectives onto software systems. Ideally, all models should use the same model element to describe the same part of a system. Practically, m...
The article deals with the possible methodology of processing of data and information for the search of prediction of heat supply daily diagram (HSDD). The methodology includes te...