Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
In the near future, off-road mobile robots will feature high levels of autonomy which will render them useful for a variety of tasks on Earth and other planets. Many terrestrial a...
Abstract. Multi-user virtual environment (MUVE) systems enable virtual participation in many applications. A MUVE usually is a complex system requiring technologies from 3D graphic...
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries “dynamically” or in “real time”....
Li Zhang, Michael P. Bieber, David E. Millard, Vin...