This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
We address the problem of face recognition from a large set of images obtained over time - a task arising in many surveillance and authentication applications. A set or a sequence ...
Gregory Shakhnarovich, John W. Fisher III, Trevor ...
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Heterogeneous systems are systems that obey different functioning laws. For instance, during the design of embedded systems, it is generally necessary to study both the controller...