Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
- This paper describes an approach to the design of a population of cooperative robots based on concepts borrowed from Systems Theory and Artificial Intelligence The research has b...
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
In previous papers, a passive control implementation structure is proposed for mechanical systems interacting with physical environments. The proposed implementation structure enf...
We present a tool for the design and validation of embedded real-time applications. The tool integrates two approaches, the use of the synchronous programming language ESTEREL for...