— This video presents a humanoid two-arm system developed as a research platform for studying dexterous twohanded manipulation. The system is based on the modular DLR-Lightweight...
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
For execution of complex biological queries, data integration systems often use several intermediate data sources because the domain coverage of individual sources is limited. Qual...
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
Managing energy consumption has become vitally important to battery operated portable and embedded systems. A dynamic voltage scaling (DVS) technique reduces the processor’s dyn...