We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
We describe a computing facility created, supported, maintained, and used entirely by undergraduatestudents. This facility exists outside of the instructional support system,so th...
This paper describes a robotic manipulation primitive called toppling--knocking a part over. We derive the mechanical conditions for toppling, express these as constraints on robo...
Multimedia traffic can typically tolerate some loss but has rigid delay constraints. A natural QoS requirement for a multimedia connection is a prescribed bound on the the fraction...
Martin Reisslein, Keith W. Ross, Srinivas Rajagopa...
This paper presents the constraints involved by MPEG-4 to copyright protection systems based upon watermarking technology. It proposes also an assessment methodology in order to ev...