The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
In a combined negotiation in e-commerce, the user is interested in many goods or services and consequently engages in many negotiations at the same time. The negotiations are inde...
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
We show that traditional waveform-coding and 3-D modelbased coding are not competing alternatives but should be combined to support and complement each other. Both approaches are ...
Grasping a curved object free in the plane may be done through rolling a pair of fingers on the object’s boundary. Each finger is equipped with a tactile sensor able to record...