Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
In this poster, we present a novel P2P (Peer to Peer) based distributed services network (DSN), which is a next generation operable and manageable distributed core network archite...
Yang Li, Yi-Chuan Wu, Jian-Ying Zhang, Jin Peng, H...
Most of today’s mobile internet devices contain facilities to display maps of the user’s surroundings with points of interest embedded into the map. Other researchers have alr...
Christian Sandor, Andrew Cunningham, Ulrich Eck, D...
A model-free, biologically-motivated learning and control algorithm called S-learning is described as implemented in an Surveyor SRV-1 mobile robot. S-learning demonstrated learni...
Brandon Rohrer, Michael Bernard, J. Daniel Morrow,...
We present MobileTI, a portable tele-immersive system that merges 3D video representations of users in real time to enable remote collaboration across geographical distances. With...
Wanmin Wu, Raoul Rivas, Md. Ahsan Arefin, Shu Shi,...