— When the end-effector of a robot is slid on a flat surface, the stiffness matrix obtained by linear fitting of position and force contains information not only on the stiffne...
—Applications on mobile computers must adapt to high variability in wireless network performance. Extending the semantics of transport protocols to offer more control over commun...
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
We present a developed function library named pbifSystem which will allow for remote control of the webbrowser Firefox. Instead of controlling the browser through general pc input...
Two main aspects of Partial Evaluation for Prolog programs are considered: treatment of cuts and control of recursion. The analysis about cut is exhaustive: we consider occurrence...