Memory traces record the addresses touched by a program during its execution, enabling many useful investigations for understanding and predicting program performance. But complete...
Database engines and database-centric applications have become complex software systems. Ensuring bug-free database services is therefore a very difficult task. Whenever possible...
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Research within knowledge management tends to either overemphasize or underestimate the role of Information and Communication Technology (ICT). Furthermore, much of the ICT suppor...
We have been developing new abilities of humanoid robot to realize proxy drives of a lift truck. Construction machines such as a lift truck play an important role in many tasks, b...