The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Based on the FOCUS theory of distributed systems (see [Broy, Stølen 01]) that are composed of interacting components we introduce a formal model of services and layered architectu...
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
A common computational model in distributed embedded systems is that the nodes exchange signals via a network. Most often a signal represents the state of some physical device and...
A novel particle filter, the Memory-based Particle Filter
(M-PF), is proposed that can visually track moving objects
that have complex dynamics. We aim to realize robustness
aga...
Dan Mikami (NTT), Kazuhiro Otsuka (NTT), Junji YAM...