Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
In this paper, a high-performance face recognition terminal for access control systems is described. The terminal is specially designed to acquire stable face patterns for reliabl...
: The paper presents a hard real-time kernel for distributed computer control systems (DCCS) highlighting a number of novel features, such as integrated scheduling of hard and soft...
: In this paper we explain how we have integrated the functionalities of a constraint management system and a temporal data base system to enable a model-based control of systems t...