Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
The objective of this paper is to explore the feasibility of using multiple low-altitude, short endurance (LASE) unmanned air vehicles (UAVs) to cooperatively monitor and track th...
David W. Casbeer, Derek B. Kingston, Randal W. Bea...
This paper introduces a method for automatic composition of Semantic Web services using Linear Logic (LL) theorem proving. The method uses a Semantic Web service language (DAML-S)...
In this paper we introduce a framework for instrumenting (“rigging”) characters that are modeled as dynamic elastic bodies, so that their shapes can be controlled by an animat...
Steve Capell, Matthew Burkhart, Brian Curless, Tom...
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...