Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
This paper describes a stand-alone network-based video capture and processing peripheral (the Vidboard) for a distributed multimedia system centered around a gigabit-per-second As...
This paper describes an evaluation of a consumer application for soccer highlights detection, which combines advanced user interaction with an underlying automatic highlights dete...
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
— Tendon driven mechanisms have been considered in robotic design for several decades. They provide lightweight end effectors with high dynamics. Using remote actuators it is pos...