Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
This report presents the development of tactile sensing-based control architecture in a multi-fingered humanoid robot arm for object manipulation tasks. With the aim to enhance the...
Hanafiah B. Yussof, Masahiro Ohka, Hirofumi Suzuki...
— Angioplasty is a minimally invasive procedure wherein a catheter (a thermoplastic hollow wire) is inserted into the femoral artery and guided till it reaches a blockage in the ...
Jagadeesan Jayender, Rajnikant V. Patel, S. Nikumb