Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
This paper shows how to construct a Markovian arrival process of second order from information on the marginal distribution and on its autocorrelation function. More precisely, clo...
Protocols specifying business interactions among autonomous parties enable reuse and promote interoperability. A protocol is specified from a global viewpoint, but enacted in a di...
Imagination is generally regarded as a very powerful and advanced cognitive ability. In this paper we propose a modelling framework for what we call functional imagination: the ab...
Hugo Gravato Marques, Owen Holland, Richard Newcom...
A computable graph is computably categorical if any two computable presentations of the graph are computably isomorphic. In this paper we investigate the class of computably catego...
Barbara F. Csima, Bakhadyr Khoussainov, Jiamou Liu