A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Abstract—We present RODEO, a RObust and rapidly DEplOyable wireless mesh network designed for applications such as disaster management. Natural disasters often destroy existing c...
Aniesh Chawla, Vinay Yadav, Vasu Dev Sharma, Jitin...
Many observers have praised new communication technologies for providing convenient and affordable tools for maintaining relationships at a distance. Yet the precise role of media...
Irina Shklovski, Robert E. Kraut, Jonathon N. Cumm...