—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
This paper summarizes some of our unclassified work on concepts and techniques for performing automated runtime time-critical resource management (especially scheduling) in large ...
—Space exploitation will require efficient techniques for manipulating passive objects on orbit. This work presents a manipulation concept that utilizes both the on-off thruste...