Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Abstract—We consider an interference-limited wireless network, where multiple source-destination pairs compete for the same pool of relay nodes. In an attempt to maximize the sum...
This paper presents a thorough evaluation of grid map based sensor fusion algorithms for mapping the environment of a mobile robot. Three physical sensors were used for creating t...
― Self-assembly systems in space are arguably within the reach of today’s technology based on the research and development of self-reconfigurable robots on earth. This paper pr...
This paper demonstrates that work in digital enterprises—like work in conventional enterprises— can be carried out effectively by autonomous agents, subject to a regulatory r...