Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
Abstract. A hybrid workflow system could be treated as a domain-across infrastructure by incorporating different workflow systems and WfMSs engaged in the complex business processi...
Wan-Chun Dou, Shing-Chi Cheung, Guihai Chen, Jie W...
Abstract. This paper derives an optimization-based control methodology for networks of switched and hybrid systems in which each mode is governed by a partial differential equatio...
Alexandre M. Bayen, Robin L. Raffard, Claire Tomli...
—The electro-fused magnesia furnace is one of the main equipments used to produce electro-fused magnesia which is high performance refractory. Due to the multivariable, strong no...
Yongjian Wu, Zhiwei Wu, Bin Dong, Li Zhang, Tianyo...
While many methods exist for visualising scalar and vector data, visualisation of tensor data is still troublesome. We present a method for visualising second order tensors in thr...
Andreas Sigfridsson, Tino Ebbers, Einar Heiberg, L...