Existing plan-based theories of speech act interpretation do not account for the conventional aspect of speech acts. We use patterns of linguistic features (e.g. mood, verb form, ...
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
This paper addresses the design and implementation of an adaptive document version management scheme. Existing schemes typically assume: (i) a priori expectations for how versions ...
Abstract. This paper takes a fresh look at the application of interval analysis to ordinary differential equations and studies how consistency techniques can help address the accur...
Yves Deville, Micha Janssen, Pascal Van Hentenryck
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...