Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Game theory has been playing an increasingly visible role in computer science in general and AI in particular, most notably in the area of multiagent systems. I briefly list the a...
In this paper, we propose a generalization of Centering Theory (CT) (Grosz, Joshi, Weinstein 1995) called Veins Theory (VT), which extends the applicability of centering rules fro...
We examine two-cardinal problems for the class of O-minimal theories. We prove that an O-minimal theory which admits some (κ, λ) must admit every (κ , λ ). We also prove that ...
This paper familiarizes the audience with the Triune Continuum Paradigm, a paradigm that provides philosophically supported theoretical foundations for system modeling in general a...