We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
— Several recently-designed robots are able to scale steep surfaces using animal-inspired strategies for foot attachment and leg kinematics. These designs could be valuable for r...
Kathryn A. Daltorio, Timothy C. Witushynsky, Grego...
Abstract—Content-based routing (CBR) is becoming increasingly popular as a building block for distributed applications. CBR differs from classical routing paradigms as messages a...
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...