Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
Abstract-- This work aims at the development of a versatile control strategy for operating unknown mechanically constrained devices such as drawers or doors. Few assumptions on the...
Ewald Lutscher, Martin Lawitzky, Gordon Cheng, San...
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
We combine a "hybrid" force/position control scheme with a potential field approach into a novel method for collision recovery and navigation in unknown environments. It...