Autonomy is regarded as a crucial notion in multi-agent systems and several researchers have tried to identify what are the agent's parts that give it an autonomous character....
We study extensions of first-order logic over the reals with different types of transitive-closure operators as query languages for constraint databases that can be described by...
Systems for sound retrieval are usually “sourcecentred”. This means that retrieval is based on using the proper keywords that define or specify a sound source. Although this t...
In order to improve patients’ life conditions and to reduce the costs of long hospitalization, the medicine is more and more interested in the telemonitoring techniques. These wi...
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...