Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
A new gradient-based routing protocol is proposed in this paper. It takes into account the minimum hop count and remaining energy of each node while relaying data from source node ...
Exception mechanism is important for the development of robust programs to make sure that exceptions are handled appropriately at run-time. In this paper, we develop a dynamic exce...
This paper describes the joint approach of three research groups to enable a heterogeneous team of robots to exchange belief. The communication framework presented imposes little r...
This paper introduces feature-based textures, a new image representation that combines features and samples for high-quality texture mapping. Features identify boundaries within a...