Shadows are well known as a programming language feature in the application area of MUDs (a certain type of multi-player online game). We argue that agile methodologies can be enh...
This paper presents a Case-Based Reasoning approach for the personalized access and the students’ coauthoring tasks in on-line repositories of Learning Objects (LOs). The person...
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
— In this paper we present algorithms that enable precise trajectory control of NIMS3D, an underconstrained, three-dimensional cabled robot intended for use in actuated sensing. ...
Per Henrik Borgstrom, Nils Peter Borgstrom, Michae...