We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
— Many complex, real world phenomena are difficult to study directly using controlled experiments. Instead, the use of computer simulations has become commonplace as a cost effe...
Dirk Gorissen, Luciano De Tommasi, Jeroen Croon, T...
We develop a tracking controller for the dynamic model of unicycle mobile robot by integrating a kinematic controller and a torque controller based on Fuzzy Logic Theory. Computer ...
Leslie Astudillo, Oscar Castillo, Patricia Melin, ...
—Current-generation cloud computing is offered with usage-based pricing, with no bandwidth capacity guarantees, which is however unappealing to bandwidth-intensive applications s...
Communication is becoming one of the central elements in software development. As a potential typed foundation for structured communication-centred programming, session types have...