We investigate interchangeability of values in CSPs, based on an approach where a single value in the domain of a variable can be treated as a combination of “sub-values”. An ...
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Abstract. This work presents an analysis of the static Aging operator for different evolutionary algorithms: two immunological algorithms (OptIA and Clonalg), a standard genetic a...
Mario Castrogiovanni, Giuseppe Nicosia, Rosario Ra...
In this paper we propose five heuristic procedures for the solution of the multiple competitive facilities location problem. A franchise of several facilities is to be located in ...
There is often a trade-off between the accuracy and the speed of optical flow techniques. Given similar computational resources, this trade-off results in some techniques making i...
Andrew M. Peacock, David S. Renshaw, John M. Hanna...