We study Nonassociative Lambek Calculus with additives ∧, ∨, satisfying the distributive law (Distributive Full Nonassociative Lambek Calculus DFNL). We prove that categorial g...
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Information visualization research typically focuses on the formal aspects of specific graphic solutions in terms of their thinking and/or communication support. This type of anal...
We introduce an adversarial planning algorithm based on game tree search, which is applicable in large-scale multiplayer domains. In order to tackle the scalability issues of game...
Abstract. Virtualization technology has become commonplace in modern data centers and cluster systems, often referred as “computing clouds”. In particular, the capability of vi...
William Voorsluys, James Broberg, Srikumar Venugop...