Text-based approaches to the analysis of software evolution are attractive because of the fine-grained, token-level comparisons they can generate. The use of such approaches has, ...
Austen Rainer, Peter C. R. Lane, James A. Malcolm,...
— This paper describes an original control law called qualitative servoing. The particularity of this method is that no specific desired value is specified for the visual featu...
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
Conventional document search techniques are constrained by attempting to match individual keywords or phrases to source documents. Thus, these techniques miss out documents that co...
ThiJ puper addresses the issue of dynamic similarity and intensive property invariance in scaled bilateral naunipulation, and ofsers a design methodology bused on these considerat...