The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
The cluster structure of many real-world graphs is of great interest, as the clusters may correspond e.g. to communities in social networks or to cohesive modules in software syst...
It is difficult to implement a stable and realistic haptic simulation for cutting rigid objects that is based on a damping model because of an inevitable conflict between stability...
Guanyang Liu, Yuru Zhang, Dangxiao Wang, William T...
SpaceTag is an object system on which each object called SpaceTag can be accessed only from limited locations and limited time period. Its applications include entertainment syste...
Hiroyuki Tarumi, Ken Morishita, Megumi Nakao, Yahi...
Meta-logics and type systems based on intuitionistic logic are commonly used for specifying natural deduction proof systems. We shall show here that linear logic can be used as a m...