Recently model checking representation and search techniques were shown to be efciently applicable to planning, in particular to non-deterministic planning. Such planning approach...
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
: This article examines information theory from the aspect of its "conduit metaphor." A historical approach and a close reading of certain texts by Warren Weaver and Nor...
Abstract. The spectrotemporal receptive field (STRF) is a functional descriptor of the linear processing of timevarying acoustic spectra by the auditory system. By cross-correlatin...
David J. Klein, Didier A. Depireux, Jonathan Z. Si...
A long range Laser Range Finder (LRF) is proposed and developed in this paper. A mathematical model, which relates the relation between object distance and Position Sensitive Dete...