Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered Loc...
David Graumann, Jeffrey Hightower, Walter Lara, Ga...
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
Combination of sliding-mode control and an AI block based on fuzzy logic is introduced. This hybrid control structure provides very good control performance and robustness of contr...
Vladimir B. Bajic, Daohang Sha, Xinzhong Li, Xingm...
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
This paper describes a novel approach to high-level synthesis of complex pipelined circuits, including pipelined circuits with feedback. This approach combines a high-level, modula...