This paper discusses the process of parsing adult utterances directed to a child, in an effort to produce a syntactically annotated corpus of the verbal input to a human language ...
Automated software verification and path-sensitive program analysis require the ability to distinguish executable program paths from those that are infeasible. To achieve this, pro...
Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID priv...
Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao
Human-like behavior is crucial for intelligent service robots that are to perform versatile tasks in day to day life. In this paper, an integrated approach to human-like manipulat...
Sukhan Lee, Hadi Moradi, Daesik Jang, Han-Young Ja...
It is due to the modularity they provide that results for cascaded systems have proved their utility in numerous control applications as well as in the development of general cont...