Abstract. In this paper, we review methods used for macroscopic modeling and analyzing collective behavior of swarm robotic systems. Although the behavior of an individual robot in...
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
For wireless mobile Internet users the length of the battery life is one of the most important performance factors. The energy efficiency of the data transmission over radio is a ...
Enrico Rantala, Arto Karppanen, Seppo Granlund, Pa...
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
We present a technique for rendering animated 3D models in a Su-Muk painting style with user’s guide. First, a user can sketch directly over 3D models by varying ink and water va...
Jung Lee, Joon-Yong Ji, Soo-Kyun Kim, Chang-Hun Ki...