The iterative method labelled Correlation-based Tuning (CbT) is considered in this paper for tuning linear time-invariant multivariable controllers. The approach allows one to tun...
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
—We propose an adaptive hybrid automatic repeat request–forward error correction (ARQ–FEC) erasure-correcting scheme for quality of service (QoS)-driven mobile multicast serv...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...