raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
— The paper describes an indoor helicopter testbed that allows implementing and testing of bio-inspired control algorithms developed from scientific studies on insects. The heli...
Shuo Han, Andrew D. Straw, Michael H. Dickinson, R...
Abstract. Crawling the deep web often requires the selection of an appropriate set of queries so that they can cover most of the documents in the data source with low cost. This ca...
— To close the loop between motion and vision, tracked visual features must remain in the camera field of view (visibility constraint). To overcome the visibility constraint, vi...
Hicham Hadj-Abdelkader, Youcef Mezouar, Nicolas An...
We describe research carried out as part of a text summarisation project for the legal domain for which we use a new XML corpus of judgments of the UK House of Lords. These judgmen...