In this paper, it is shown that any non-M-cosingular -supplemented module M is (D3) if and only if M has the summand intersection property. Let N [M ] be any module such that Z M(...
This paper analyzes the entrants to the 2007 TAC Market Design Game. We present a classification of the entries to the competition, and use this classification to compare these ent...
Jinzhong Niu, Kai Cai, Simon Parsons, Peter McBurn...
Knowledge in knowledge bases have two categories: complete and incomplete. In this paper, through uniformly expressing these two kinds of knowledge, we first address four operator...
The paper characterizes the class of all concave resource allocation problems in interference coupled wireless systems. An axiomatic framework for interference functions proposed ...
The title of this paper, besides being a pun, can be taken to mean either the frontier of research in graph transformation, or the advantage of using graph transformation. To focus...
FACT is an interactive paper system for fine-grained interaction with documents across the boundary between paper and computers. It consists of a small camera-projector unit, a la...
Chunyuan Liao, Hao Tang, Qiong Liu, Patrick Chiu, ...
Abstract: This paper investigates the the development and evolution of concepts and the management of transformers, which adds semantics to the concepts. We illustrate how concepts...
In equality-based binary r e s o l u t i o n , the v i a b i l i t y t e s t is used as a decision mechanism to select disagreement sets and also to define the RUE u n i f i e r ....
Vincent J. Digricoli, James J. Lu, V. S. Subrahman...
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
This paper reports on the techniques used to successfully translate with the help of a computer a Mathematics textbook from Portuguese to English. Even if these techniques are sim...