A service robot should be able to automatically plan manipulation actions to help people in domestic environments. Following the classic senseplan-act cycle, in this paper we prese...
Steffen W. Ruehl, Zhixing Xue, Thilo Kerscher, R&u...
In this paper, the achievable rates of the so called "multiple-input multiple-output interference channel", exploited by a couple of single antenna primary terminals and...
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main ...
Cas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan ...
Complex event patterns involving Kleene closure are finding application in a variety of stream environments for tracking and monitoring purposes. In this paper, we propose a compac...
Daniel Gyllstrom, Jagrati Agrawal, Yanlei Diao, Ne...
We discuss Morpheus, a data transformation construction tool and associated repository. The architecture of Morpheus is motivated by the goal to reuse (pieces of) previously writt...