This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Hierarchical conceptual clustering has been proven to be a useful data mining technique. Graph-based representation of structural information has been shown to be successful in kn...
Automatedtheorem proving with connection tableau calculi imposessearch problemsin tremendoussearch spaces. In this paper, wepresent a newapproachto search space reduction in conne...
The paper presents a survey of the VSE system, a kind of CASE-tool for formal software development. It is a summary of a tutorial presentation describing methodology, formalisms, ...
The existence of large datasets requires methods for producing simpler or summarized views of data. Typical approaches to summarization based on statistics do not capture complete...
Autonomy is a quality for devices and creatures that perform tasks with relative independence from their designers and sources of authority. We discuss the idea and present two ca...
A robotic agent must coordinate its coupled concurrent behaviors to produce a coherent response to stimuli. Reinforcement learning has been used extensively in coordinating sensin...