Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Admission control and overload management techniques are central to the design and implementation of RealTime Database Systems. In this paper, we motivate the need for these mecha...
— In this paper the application of a behavior-based control approach, namely the Null-Space-based Behavioral control, to coordinate a fleet of autonomous surface vessels is pres...
Filippo Arrichiello, Stefano Chiaverini, Thor I. F...