We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
The context of this article is the program to develop monoidal bicategories with a feedback operation as an algebra of processes, with applications to concurrency theory. The obje...
Robert D. Rosebrugh, Nicoletta Sabadini, Robert F....
: Robotic microhandling is disturbed by the adhesion phenomenon between the micro-object and the grippers. This phenomenon is directly linked to both the object and the gripper sur...
Real-time programs are, in general, difficult to design and verify. The inheritance mechanism can be useful in reusing well-defined and verified real-time programs. In application...
Mehmet Aksit, Jan Bosch, William van der Sterren, ...
We propose a novel scheme to detect human actions in active video. Active videos such as movies or sports broadcasting are taken purposively by “clever” photographers. They ar...