We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
This paper reports on advances in the design and development of a high-performance direct-drive joint for robotics and automation. The joint integrates a motor, a torque sensor and...
This paper describes some of the novel technologies adopted in the realization of the NASA Dual-frequency Dualpolarized Doppler Radar (D3R) system for to be used by the GPM ground...
Manuel Vega, James Carswell, V. Chandrasekar, Math...
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...