Abstract. We analyse different versions of the Dining Cryptographers protocol by means of automatic verification via model checking. Specifically we model the protocol in terms of ...
Magdalena Kacprzak, Alessio Lomuscio, Artur Niewia...
We present a collaborative learning tool for programming, Jeliot Collaboratively or JeCo. Jeliot Collaboratively is a combination of a program visualization tool for Java programs,...
: Probabilistic models for biological sequences (DNA and proteins) are frequently used in bioinformatics. We describe statistical tests designed to detect the order of dependency a...
In this paper, we consider the optimal well-constrained completion problem, that is, for an under-constrained geometric constraint problem, add automatically new constraints in suc...
When using the ordered weighted average operator, it can happen that one wants to optimize the variability (measured by the entropy (maximal) or by the variance (minimal)) of the ...