Location-based ubiquitous computing systems are entering mainstream society and becoming familiar parts of everyday life. However, the settings in which they are deployed are alre...
We introduce the calculus of structures: it is more general than the sequent calculus and it allows for cut elimination and the subformula property. We show a simple extension of m...
We describe the architecture of an interactive, “believable” agent with personality, called user agent, which can act on behalf of a user in various multi-user game contexts, w...
Compile-time program optimizations are similar to poetry: more are written than are actually published in commercial compilers. Hard economic reality is that many interesting opti...
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...