Abstract. Explicit state methods have proven useful in verifying safetycritical systems containing concurrent processes that run asynchronously and communicate. Such methods consis...
In this paper, a new framework for the tracking of closed curves is described. The proposed approach, formalized through an optimal control technique, enables a continuous trackin...
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
Abstract— We describe a novel intelligent execution monitoring approach for mobile robots acting in indoor environments such as offices and houses. Traditionally, monitoring exe...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...