Pencil-and-paper exercises in public-key cryptography are important in learning the subject. It is desirable that a student doing such an exercise does not get the right answer by...
Suan Khai Chong, Graham Farr, Laura Frost, Simon H...
User interface designers still have to rely on personal creativity and skill when designing computer icons for program functions that have no existing conventional representation....
Many multi-agent systems seek to reconcile two apparently inconsistent constraints. The system’s overall objective is defined at a global level. However, the agents have only lo...
H. Van Dyke Parunak, Sven Brueckner, John A. Saute...
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Independence models induced by some uncertainty measures (e.g. conditional probability, possibility) do not obey the usual graphoid properties, since they do not satisfy the symme...