Abstract— Nanomanipulation using Atomic Force Microscope (AFM) has been extensively investigated for many years. However, control of tip position during nanomanipulation is still...
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Galois field implementations are central to the design of many reliable and secure systems, with many systems implementing them in software. The two most common Galois field opera...
Kevin M. Greenan, Ethan L. Miller, Thomas J. E. Sc...