— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
In a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. This is especially true ...
Seth H. Pugsley, Manu Awasthi, Niti Madan, Naveen ...
—As wireless devices and sensors are increasingly deployed on people, researchers have begun to focus on wireless body-area networks. Applications of wireless body sensor network...
Gang Zhou, Jian Lu, Chieh-Yih Wan, Mark D. Yarvis,...
VESPA (Vehicular Event Sharing with a mobile P2P Architecture) 1 is a system for enabling vehicles to share information in vehicular ad-hoc networks (VANETs). The originality of V...
Bruno Defude, Thierry Delot, Sergio Ilarri, Jos&ea...
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...