People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
Context-enabled applications are just emerging and promise richer interaction by taking environmental context into account. However, they are difficult to build due to their distr...
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...
This work presents an approach to the obstacle avoidance problem, applicable in the frame of driver assistance. A decision, expressed as a proposed acceleration vector for the veh...
Franck Gechter, Jean-Michel Contet, Pablo Gruer, A...