Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Systems supporting situation awareness in large-scale control systems, such as, e. g., encountered in the domain of road traffic management, pursue the vision of allowing human ope...
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...