- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
This paper describes a method for structuring a robot motor learning task. By designing a suitably parameterized policy, we show that a simple search algorithm, along with biologi...
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
— We consider the general problem of optimizing the performance of OBS networks with multiple traffic classes subject to strict (absolute) QoS constraints in terms of the end-to...
Abstract. Technology to support care at home is a promising alternative to traditional approaches. However, home care systems present significant technical challenges. For example,...