— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
— Two feedback controllers that induce stable running gaits on a three-degree-of-freedom asymmetric hopper, termed the Asymmetric Spring Loaded Inverted Pendulum (ASLIP), see Fig...
This paper presents the automatic extension of TERSEO to other languages, a knowledge-based system for the recognition and normalization of temporal expressions, originally develo...
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...