Abstract. We consider a formalisation of a notion of observer (or intruder) theories, commonly used in symbolic analysis of security protocols. An observer theory describes the kno...
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
This paper describes the Rostering Engine (RE) that we have developed for the Hospital Authority (HA), Hong Kong as part of their Staff Rostering System (SRS) using AI constraint-...
Andy Hon Wai Chun, Steve Ho Chuen Chan, Garbbie Pu...
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Model counting is the classical problem of computing the number of solutions of a given propositional formula. It vastly generalizes the NP-complete problem of propositional satis...