Recognizing useful modular robot configurations composed of hundreds of modules is a significant challenge. Matching a new modular robot configuration to a library of known configu...
Michael Park, Sachin Chitta, Alex Teichman, Mark Y...
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
This paper reviews the career and legacy of William (Bill) Goffman, who served as a researcher, Professor, Dean and Emeritus at Case Western Reserve University, Cleveland, Ohio, f...
ct 8 In this paper, a new robust relevance model is proposed that can be applied to both pseudo and true relevance feedback 9 in the language-modeling framework for document retrie...
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...