Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Many AI problems can be modeled as constraint satisfaction problems (CSP), but many of them are actually dynamic: the set of constraints to consider evolves because of the environ...
Cognitive informatics studies the natural intelligence and the brain from a theoretical and a computational approach, which rigorously explains the ms of the brain by a fundamental...
In many applications decisions must be made about the state of an object based on indirect noisy observation of highdimensional data. An example is the determination of the presen...
Burkay Orten, Prakash Ishwar, W. Clem Karl, Venkat...