The general stubborn set approach to CTL model checking 2] has the drawback that one either nds a stubborn set with only one enabled transition or one has to expand all enabled tra...
This paper describes the geometrical limitations of algorithms for 3D reconstruction which use corresponding line tokens. In addition to announcing a description of the general cri...
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Abstract— A novel approach named recursive evidence filtering for information processing in Distributed Sensor Networks (DSNs) is presented. It is based on the Dempster-Shafer (...
Duminda A. Dewasurendra, Peter H. Bauer, Kamal Pre...
We introduce a general framework that is based on distance semantics and investigate the main properties of the entailment relations that it induces. It is shown that such entailm...