A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Tactile displays are used to convey small-scale force and shape information to the fingertip. We describe a 6 x 6 tactile shape display design that is low in cost and easily const...
Christopher R. Wagner, Susan J. Lederman, Robert D...
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
We consider a networking subsystem for message–passing clusters that uses two unidirectional queues for data transfers between the network interface card (NIC) and the lower prot...
Abstract. In this paper, we formulate and robustly solve a quite general class of hybrid controller synthesis problems. The type of controller we investigate is the switching contr...