This paper presents a new distributed real-time control architecture for flexibly automated production systems. The modelling assumptions underlying the design en by, and abstract,...
Jonghun Park, Spyros A. Reveliotis, Douglas A. Bod...
An experiment was conducted in order to evaluate what normative framework is pertinent for dealing with confidence judgements in human experts. 24 films were shown to 4 experimente...
A view is a particular visual representation of a data set. Complex data sets typically require multiple views, each revealing a different aspect of the data. Coordinating the beh...
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...