Abstract. Network-based software application services are receiving a lot of attention in recent years, as observed in developments as Internet of Services, Software as a Service a...
The common vision of pervasive computing environments requires a very large range of devices and software components to interoperate seamlessly. From the assumption that these dev...
Abstract— This paper describes a novel approach for multirobot caging and manipulation, which relies on the team of robots forming patterns that trap the object to be manipulated...
Facial composites are pictures of human faces. These are normally constructed by victims and witnesses of crime who describe a suspect's face and then select individual facial...
Charlie D. Frowd, Vicki Bruce, Alex H. McIntyre, D...
We propose to study two infinite graph transformations that we respectively call bounded and unbounded path transduction. These graph transformations are based on path substitutio...