Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
Both optimization and learning play important roles in a system for intelligent tasks. On one hand, we introduce three types of optimization tasks studied in the machine learning l...
Many software acquisition projects are doomed to fail due to a lack of integration of acquisition and development processes on the one hand and, because of shortcomings of classic...
Werner Aigner, Peter Regner, Thomas Wiesinger, Jos...
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
Abstract. Today’s software platforms that support the construction of agent systems in accordance with the FIPA specifications essentially provide enabling infrastructure servic...