Contracts in the real world often rest upon a notion of responsibility, by which parties commit to the fulfilment of particular imperatives embedded in the contract. Responsibili...
Martin J. Kollingbaum, Timothy J. Norman, Chris Re...
In this work it is shown the representation of 3D object shape acquired from grasp exploration. Electromagnetic motion tracking sensors are used on the fingers for object contour f...
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
Abstract--In this paper, d-AdaptOR, a distributed opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement lear...
Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi,...
As the number of information in the Internet constantly increases and the complexity of systems rapidly grows, locating and manipulating complex data has become a difficult task. W...