Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Abstract. This paper investigates the processes used by an evolved, embodied simulated agent to adapt to large disruptive changes in its sensor morphology, whilst maintaining perfo...
Peter Fine, Ezequiel A. Di Paolo, Eduardo Izquierd...
, and of course, you have the option to download any article straight to your desktop, depending on your access rights. Read more about how the TOP 25 is generated and what it refl...
Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. Th...
We develop a formal theory of mereology that includes relations that change over time. We show how this theory formalizes reasoning over domains of material objects, which include...