We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
— In this paper we present a gradient method to iteratively update local controllers of a distributed linear system driven by stochastic disturbances. The control objective is to...
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Abstract— A promising approach to the effective utilization of wavelength division multiplexed networks is to transfer data on an on-demand basis using fast wavelength reservati...
– This paper presents a modular and reconfigurable robot for multiple locomotion modes based on reconfigurable modules. Each mode consists of characteristics for the environment ...
Wei-Min Shen, Maks Krivokon, Harris Chiu, Jacob Ev...