Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Dynamic Predicate Logic (DPL) is a variant of Predicate Logic introduced by Groenendijk en Stokhof. One rationale behind the indroduction of DPL is that it is closer to Natural La...
RSCTC’2010 Discovery Challenge was a special event of Rough Sets and Current Trends in Computing conference. The challenge was organized in the form of an interactive on-line com...
Marcin Wojnarski, Andrzej Janusz, Hung Son Nguyen,...
Abstract. This paper focuses on the use and interpretation of approximate databases where both rough sets and indiscernibility partitions are generalized and replaced by approximat...
The presence of uncertainty in the real world makes robustness to be a desired property of solutions to constraint satisfaction problems. Roughly speaking, a solution is robust if...