The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
Parallelism in processor architecture and design imposes a verification challenge as the exponential growth in the number of execution combinations becomes unwieldy. In this paper...
Applications and digital goods for mobile devices have been around for more than a decade. Recent technology development has also driven the use of mobile commerce technology. Mob...
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
—Accurately simulating user movements in Mobile Ad hoc Networks (MANETs) is very important to the prediction of actual network and user performance. Therefore, using a realistic ...