Abstract— Multi-hop relaying has attracted considerable attention recently as a key technique for improving cell coverage and throughput in wireless communication. We modelled va...
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
This paper presents user interface technology, using a glove based menuing system and 3D interaction techniques. It is designed to support applications that allow users to constru...
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
Abstract. In this paper we show how hybrid control and modeling techniques can be put to work for solving a problem of industrial relevance in Surface Mount Technology (SMT) manufa...
Leandro G. Barajas, Ashish Kansal, Abhinav Saxena,...