Abstract-- This paper presents a framework for visual servoing that guarantees convergence to a visible goal from almost every initially visible configuration while maintaining ful...
Noah J. Cowan, Joel Weingarten, Daniel E. Koditsch...
Abstract. Probabilistic model checking is a formal verification technique that has been successfully applied to the analysis of systems from a broad range of domains, including sec...
John Heath, Marta Z. Kwiatkowska, Gethin Norman, D...
Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Abstract. Issues related to technology, including diffusion, acceptance, adoption, and adaptation, have been the focus of research for different disciplines including Information S...
In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...