Classical content sharing applications like BitTorrent are not designed to run over wireless networks. When adapting them to these constrained networks, two main problems arise. On...
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
— Leveraging research by psychologists on human decision-making, we present a human-robot decision-making problem associated with a complex task and study the corresponding joint...
Ming Cao, Andrew Reed Stewart, Naomi Ehrich Leonar...
— The detection of transient responses, i.e. non– stationarities, that arise in a varying and small fraction of the total number of neural spike trains recorded from chronicall...
— Methods for direct data-driven tuning of the parameters of precompensators for LPV systems are developed. Since the commutativity property is not always satisfied for LPV syst...
Mark Edward John Butcher, Alireza Karimi, Roland L...