In the context of large scale industrial installations, model checking often fails to tap its full potential because of a missing link between a system’s specification and its f...
We identify two fundamental points of utilizing CBR for an adaptive agent that tries to learn on the basis of trial and error without a model of its environment. The first link co...
We study a switch Markov chain on regular graphs, where switches are allowed only between links that are at distance 3; we call this the Flip. The motivation for studying the Flip...
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
We propose a fast texture-segmentation approach to the problem of 2-D and 3–D model-based contour tracking, which is suitable for real-time or interactive applications. Our appr...