— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Abstract— Human-robot collaborative task achievement requires the robot to reason not only about its current beliefs but also about the ones of its human partner. In this paper, ...
— The field of robotics is on a growth curve, with most of the growth expected in the areas of personal and service robots. As robots become more prevalent in chaotic home and in...
— The development of networking and client/server systems over the Internet had led to many collaborative work software applications. To extend the graphic design collaborative p...
Martin Lesage, Omar Cherkaoui, Faysal Abouzaid, Ma...
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
—The development of theoretical-based methods for the assessment of multi-agent systems properties is of critical importance. This work investigates methodologies for modeling, a...
Jose R. Celaya, Alan A. Desrochers, Robert J. Grav...
One-class classification naturally only provides one class of exemplars on which to construct the classification model. In this work, multiobjective genetic programming (GP) all...
—Reinforcement learning is a framework in which an agent can learn behavior without knowledge on a task or an environment by exploration and exploitation. Striking a balance betw...
Zhengqiao Ji, Q. M. Jonathan Wu, Maher A. Sid-Ahme...
—Rooted in a deep understanding of their major properties, a control paradigm for complex systems is proposed based on latest advances in modeling the dynamics of complex network...