We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Abstract. We have developed an interactive visualization software for an immersive 3D virtual environment system, which generates stereoscopic images from huge human volume dataset...
A robust teleoperation controller design methodfor an underwater manipulator is proposed considering the master and the underwater slave separately. To achieve transparency and st...
Resource management for dynamic, distributed real-time systems requires handling of unknown arrival rates for data and events; additional desiderata include: accommodation of heter...
Eui-nam Huh, Lonnie R. Welch, Behrooz Shirazi, Bre...
This paper presents a distributed scheduling algorithm for the support of QoS in multiaccess networks. Unlike most contention-based multiaccess protocols which o er no QoS guarant...