Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Designing architectural frameworks without the aid of formal modeling is error prone. But, unless supported by analysis, formal modeling is prone to its own class of errors, in wh...
Full duplex hands-free man/machine interface often suffers from directional non-stationary interference (such as a competing speaker or an echo signal) as well as a stationary int...
Web-based communities have become important places for people to seek and share expertise. We find that networks in these communities typically differ in their topology from other...
In this paper, we report some important results of design and evaluation of a wheelchair-based robotic arm system, named as KARES II (KAIST Rehabilitation Engineering Service Syste...
Zeungnam Bien, Myung Jin Chung, Pyung Hun Chang, D...