- Maintaining digital security and privacy are critical issues in the modern workplace. Sensitive and proprietary data is frequently transmitted electronically, and with the large ...
This paper extends our previous logical analysis of presumptions and burden of proof by studying the force of a presumption once counterevidence has been offered. In the jurisprude...
We have implenlented a.n interactive, Wel)-based, chat-style machine translation system, SUpl)ort;ing speech recognition and synthesis, local- or thirdparty correction of speech r...
This paper presents an approach which supports verification and model-based adaptation of software compod services implemented using Windows Workflow Foundation (WF). First, we pr...
In this paper we propose computationally simple, pointwise formulas for extended t-norms and t-conorms on fuzzy truth values. The complex convolutions of the extended operations a...