Université du Luxembourg
Computer Science and Communication Research Unit
Primarily guided with the idea to express zero-time transitions by means of temporal propositional language, we have developed a temporal logic where the time flow is isomorphic to ordinal ω 2 (concatenation of ω copies of ω). If we think... more
The aim of the paper is to present a sound, strongly complete and decidable probabilistic temporal logic that can model reasoning about evidence. The formal system developed here is actually a solution of a problem proposed by Halpern and... more
We show that certain families of sets and functions related to a countable structure A are analytic subsets of a Polish space. Examples include sets of automorphisms, endomorphisms and congruences of A and sets of the combinatorial nature... more
This paper presents a sound and strongly complete axiomatization of the reasoning about linear combinations of conditional probabilities, including compar- ative statements. The developed logic is decidable, with a PSPACE containment for... more
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local... more
Abstract. In our understanding, a mind-map is an adaptive en-gine that basically works incrementally on the fundament of ex-isting transactional streams. Generally, mind-maps consist of sym-bolic cells that are connected with each other... more
Abstract In the today's Internet and TCP/IP-networks, the queueing of packets is commonly imple-mented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversar-ial Queueing Theory. Other... more
Our belief is that conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows participating individuals to behave and interact with each... more
The following (position) paper follows the concept of the field of Artificial Life and argues that the (relational) management of data can be understood as a chemical model. Whereas each data itself is consistent with atomic entities,... more
We motivate the idea of e-conviviality in web-based systems and argue that a convivial social being deeply depends on the implicit and explicit co-operation and collaboration of natural users inside a community. We believe that a... more
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion De- tection Systems have significant Disadvantages, e.g. the need of plenty of Computational Power or the Local... more
Content zoning can be understood as a segmentation of textual documents into zones. This is inspired by [6] who initially proposed an approach for the argumentative zoning of textual documents. With the prototypical Cozo+ engine, we focus... more
Our belief is that conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows participating individuals to behave and interact with each... more
In the today's Internet and TCP/IP-networks, the queueing of packets is commonly implemented using the protocol FIFO (First In First Out). Unfortunately, FIFO performs poorly in the Adversarial Queueing Theory. Other queueing strategies... more
The explorative mind-map is a dynamic framework, that emerges automatically from the input, it gets. It is unlike a verificative modeling system where existing (human) thoughts are placed and connected together. In this regard,... more
For human beings, the processing of text streams of unknown size leads generally to problems because e.g. noise must be selected out, information be tested for its relevance or redundancy, and linguistic phenomenon like ambiguity or the... more
In this paper, we introduce an explorative but adaptive-associative information management system in the presence of a natural conversation. We take advantage of these explorative mind-maps, which have been demonstrated in and which are... more
Current network protection systems use a collection of intelligent components -e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these... more