Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method uses agent communities to manage and look up information of interest to users. An agent works as a dele...
Elasticity of cloud computing environments provides an economic incentive for automatic resource allocation of stateful systems running in the cloud. However, these systems have t...
Abstract. The last decade has seen an increase in the number of available corpus query systems. These systems generally implement a query language as well as a database model. We r...
Abstract-- This paper extends the method of virtual constraints and hybrid zero dynamics, developed for rigid robots with a single degree of underactuation, to MABEL, a planar bipe...
Koushil Sreenath, Hae-Won Park, Ioannis Poulakakis...