FEC mechanisms have been proposed to recover from packet losses, and hence to improve the perceived quality in audio applications. Recently, it has been shown in [1] that the redun...
It has been proven that scan path is a potent hazard for secure chips. Scan based attacks have been recently demonstrated against DES or AES and several solutions have been presen...
The Prolog programmer’s needs have always been the focus for guiding the development of the SWI-Prolog system. This article accompanies an invited talk about how the SWI-Prolog e...
Abstract Many models for customers impatience in queueing systems have been studied in the past; the source of impatience has always been taken to be either a long wait already exp...
In real world applications, agents - be they software agents or autonomous robots - inevitably face erroneous situations that have not been planned for. Re-planning can sometimes ...
Robert J. Ross, Rem W. Collier, Gregory M. P. O'Ha...