— Behavior-based controllers for complex missions often are more easily designed by decomposing the mission into a series of smaller subtasks. When applying this technique to a m...
We present an approach to prevent overtesting in scan-based delay test. The test data is transformed with respect to functional constraints while simultaneously keeping as many po...
After the failure of copy prevention methods, watermarking stays the main technical safeguard of electronic copyright. There are many properties that a watermarking scheme should ...
This paper proposes a concept of how to collect toll on highways. Unlike any existing method, the proposed approach requires no structure to be built on highways for the toll coll...
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic–pessimistic tradeoff is not inherent to the p...