The dynamic TCP acknowledgement problem formulated by Dooly et al. has been intensively studied in the area of competitive analysis. However, their framework does not consider the ...
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
- In this paper, we describe the mechanical design, system integration and dynamic walking of the humanoid, KHR-2 (KAIST Humanoid Robot–2). KHR-2 has 41 DOFs in total, that allow...
Jung-Yup Kim, Ill-Woo Park, Jungho Lee, Min-Su Kim...
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...