Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
A microsurgical telerobot system has been developed based on the results of the operation task analysis. The telerobot system is composed of a 6-dof parallel micromanipulator atta...
— In this paper a neural network based controller for robot positioning and tracking using direct monocular visual feedback is proposed. The visual information is provided using ...
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...