The nature of computer networks and the manner in which network services are provided are changing dramatically. Network architectures that employ virtual mobile agents to provide...
Vishakh, Nicholas Urrea, Tadashi Nakano, Tatsuya S...
We identify a class of mechanical systems for which a globally exponentially stable reduced order observer can be designed. The class is characterized by (the solvability of) a set...
Aneesh Venkatraman, Romeo Ortega, Ioannis Sarras, ...
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
In this paper we analyze the influence of the frequency of sensor data readings on the behaviours of a Robotic System (RS). This is done in the framework of behaviour based archit...
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...