This paper describes an architecture and runtime system to implement distributed control and data processing applications in a thin-client manner, suitable for implementing a thin...
We present a decentralized authorization architecture based on capabilities in which parties are able to exercise full control over their resources or delegate it in an ad-hoc man...
Feike W. Dillema, Simone Lupetti, Tage Stabell-Kul...
— Sampling-based kinodynamic planners, such as the popular RRT algorithm, have been proposed as promising solutions to planning for systems with dynamics. Nevertheless, complex s...
Humanoid robots are fascinating from two points of view, firstly their construction and secondly because they lend life to inanimate objects. The combination of biology and robots ...
Ivo Boblan, Rudolf Bannasch, Hartmut Schwenk, Fran...
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...