: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Abstract— This paper introduces a novel robotic finger concept for variable impedance grasping in unstructured tasks. A brief literature survey reveals the need for minimal comp...
Martin Wassink, Raffaella Carloni, Stefano Stramig...
In this paper, we report on a user-centered, iterative design process for augmenting sports equipment with ubiquitous computing technology. In several design iterations, a fully w...
Matthias Kranz, Wolfgang Spiessl, Albrecht Schmidt
This paper describes a set of verification components that open the way to perform on-the-fly software model checking with the Cadp toolbox, originally designed for verifying the...