Reconfigurable computing (RC) is rapidly becoming a vital technology for many applications, from high-performance computing to embedded systems. The inherent advantages of custom-...
Gongyu Wang, Greg Stitt, Herman Lam, Alan D. Georg...
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Recent development in tethered airfoil i.e. kite technology allows the possibility of exploitation of wind energy at higher altitudes than achievable with traditional wind turbines...
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
This paper presents a domain-independent architecture for facilitating visual problem solving between robots or softbots and humans. The architecture denes virtual and human agen...