In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
During product configuration, users are prone to make errors because of complexity and lack of system knowledge. Such errors cause conflicts (i.e., incompatible choices selected) a...
Abstract-- This paper demonstrates the effectiveness of simple control-theoretic tools in generating simulation-guided experiments on a synthetic in vitro oscillator. A theoretical...
Christopher Sturk, Elisa Franco, Richard M. Murray
In E-commerce processes, various rules and constraints regarding product specifications, pricing, terms and conditions are exchanged between vendors and buyers. Developing a forma...
Mizuho Iwaihara, Masayuki Kozawa, Jun Narazaki, Ya...
This paper presents a method for tuning parameters under a fixed time constraint for a general binocular stereo-vision algorithm. A major difficulty in stereo vision, as well as i...