—Emergency navigation algorithms for evacuees in confined spaces typically treat all evacuees in a homogeneous manner, using a common metric to select the best exit paths. In th...
This paper investigates the problem of joint multiuser admission control and beamforming optimization for multiple input single-output heterogeneous networks (HetNets). Considered ...
As children develop, they differ from adults in a number of important ways, including anatomy, metabolism, immune system, and the extent of myelination of the nervous system. As a ...
Claudio Enrique Fernandez-Rodriguez, Alvaro A. A. ...
—Wireless Sensor Networks (WSNs) are a prominent fundamental technology of the Internet of Things (IoT). Rather than device-to-device communications, group communications in the ...
Pawani Porambage, An Braeken, Corinna Schmitt, And...
Believability is an important characteristic of intelligent virtual agents, however, very few attempts have been made to define and formalise it. This paper provides a formal anal...
Anton Bogdanovych, Tomas Trescak, Simeon J. Simoff
Abstract. This is a review of three, agent control algorithm, replication experiments. In the 1948 essay, Intelligent Machinery, the English mathematician Alan Turing described an ...
Abstract. Entity-based searching has been introduced as a way of allowing users and applications to retrieve information about a specific real world object such as a person, an ev...
We investigate (co-)induction in Classical Logic under the propositions-as-types paradigm, considering propositional, second-order, and (co-)inductive types. Specifically, we intr...
In contrast to most kinds of computability studied in mathematical logic, feedback computability has a non-degenerate notion of parallelism. Here we study parallelism for the most...
We generalize the adjoint logics of Benton and Wadler (1996) and Reed (2009) to allow multiple different adjunctions between the same categories. This provides insight into the str...