LOGO has been evolving in incremental steps for 40 years. This has resulted in steady progress but some regions of the space of all programming languages for children cannot be re...
Peer-to-peer systems such as Gnutella and Kazaa are used by millions of people for sharing music and many other files over the Internet, and they account for a significant portio...
Ali Raza Butt, Nipoon Malhotra, Sunil Patro, Y. Ch...
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
Previous work [3, 6, 9, 8, 7, 1] has presented the time optimal trajectories for three classes of non-holonomic mobile robots: steered cars that can only go forwards, steered cars...