This article addresses a problem with copy-protecting a large collection of electronic content. The notion and severity of a generic attack are raised in the context of Adams and Z...
Abstract. Nontrivial meta-complexity theorems, proved once for a programming language as a whole, facilitate the presentation and analysis of particular algorithms. This paper give...
Today'sbusinessenvironmentis characterizedas knowledgebeing the critical resourcefor any businessactivity. Byautomatingmanyof their routinebusinessprocesses,companiesare able...
Irma Becerra-Fernandez, Karen McCarthy, Juan Rodri...
We introduce an approach to autonomously creating state space abstractions for an online reinforcement learning agent using a relational representation. Our approach uses a tree-b...
Drawing on recent theoretical efforts, a three dimensional model of anonymity in computer-supported group discussion is developed. Applying this model to a review of empirical lit...