—Autonomous man-portable robots have the potential to provide a wide range of new capabilities for both military and civilian applications. Previous research in autonomy for smal...
Item selection is a key problem in electronic guidebook design. Many systems do not apply so-called “context-awareness” technologies to infer user interest, placing the entire...
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...