Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
This paper presents a new framework for drawing graphs in three dimensions. In general, the new framework uses a divide and conquer approach. More specifically, the framework divi...
Facing great challenges in designing better assistive technology with ever more complex and pervasive IT systems we need a general change in our understanding of designing IT. Way...
Abstract— In this paper we address the problem of interpreting sensory data for human-robot interaction, especially when gathered from several robots at the same time. After desc...