To seamlessly integrate into the human physical and social environment, robots must display appropriate proxemic behavior—that is, follow societal norms in establishing their ph...
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
— Emotion recognition and adequate reactions are a crucial part of human communication and hence should also be considered for interactions between humans and robots. In this pap...
Natascha Esau, Lisa Kleinjohann, Bernd Kleinjohann
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...