We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 537 results
  1. Key Technologies for Networked Virtual Environments

    Thanks to the improvements experienced in technology during the last few years, most especially in virtual reality systems, the number and potential...

    Juan González Salinas, Fernando Boronat Seguí, ... Francisco Javier Pastor Castillo in Multimedia Tools and Applications
    Article Open access 03 April 2023
  2. Material Intelligence

    This chapter describes soft robots that use biological and chemical materials. The authors will introduce some attempts to regard them not only as a...
    Yuhei Yamada, Shingo Maeda, ... Takuma Sugi in The Science of Soft Robots
    Chapter 2023
  3. Implementation of Microgrid Digital Twin System for Unmanned Vehicles with Cloud Computing Techniques

    The digital twin (DT) has recently been forth in the rapid advancements at cloud computing and artificial intelligence (AI). It has numerous...

    M. Guru Vimal Kumar, S. Karunakaran, ... Allam Balaram in SN Computer Science
    Article 29 July 2023
  4. Layered Controller Synthesis for Dynamic Multi-agent Systems

    In this paper we present a layered approach for multi-agent control problem, decomposed into three stages, each building upon the results of the...
    Emily Clement, Nicolas Perrin-Gilbert, Philipp Schlehuber-Caissier in Formal Modeling and Analysis of Timed Systems
    Conference paper 2023
  5. Introduction

    Since the beginning of twenty-first century, engineering construction has advanced by leaps and bounds, and the scale of construction has expanded...
    Chapter 2023
  6. Cache Memory and On-Chip Cache Architecture: A Survey

    Presently, one of the most essential performance of new multicore CPUs is processing speed. Various components, including cache, are employed to...
    Nurulla Mansur Barbhuiya, Purnendu Das, Bishwa Ranjan Roy in Advanced Computing, Machine Learning, Robotics and Internet Technologies
    Conference paper 2024
  7. Max-Entropy Sampling for Deterministic Timed Automata Under Linear Duration Constraints

    Adding probabilities to timed automata enables one to carry random simulation of their behaviors and provide answers with statistical guarantees to...
    Benoît Barbot, Nicolas Basset in Quantitative Evaluation of Systems
    Conference paper 2023
  8. On the Effectiveness of Time Travel to Inject COVID-19 Alerts

    Digital contact tracing apps allow to alert people who have been in contact with people who may be contagious. The Google/Apple Exposure Notification...
    Vincenzo Iovino, Serge Vaudenay, Martin Vuagnoux in Topics in Cryptology – CT-RSA 2021
    Conference paper 2021
  9. A Low-Cost IoT Architecture Based on LPWAN and MQTT for Monitoring Water Resources in Andean Wetlands

    This paper describes the development of a monitoring system for water sources in the Tres Lagunas Andean high-altitude wetlands ecosystem (Ecuador),...

    Luis González, Andrés Gonzales, ... Alonso Cartuche in SN Computer Science
    Article 04 January 2024
  10. Repairing Timed Automata Clock Guards through Abstraction and Testing

    Timed automata (TAs) are a widely used formalism to specify systems having temporal requirements. However, exactly specifying the system may be...
    Étienne André, Paolo Arcaini, ... Marco Radavelli in Tests and Proofs
    Conference paper 2019
  11. Winfrared: An Infrared-Like Rapid Passive Device-Free Tracking with Wi-Fi

    Accurate and fast target tracking is the basis of many intelligent applications and is therefore widely discussed and researched. The existing...
    Jian Fang, Lei Wang, ... Bingxian Lu in Wireless Algorithms, Systems, and Applications
    Conference paper 2021
  12. Reliability of Ring Oscillator PUFs with Reduced Helper Data

    Enhancing the reliability of natively unstable Physically Unclonable Functions (PUFs) is a major requirement when the PUF is to generate secret...
    Julien Béguinot, Wei Cheng, ... Ville Yli-Mäyry in Advances in Information and Computer Security
    Conference paper 2023
  13. Timed Petri Nets with Reset for Pipelined Synchronous Circuit Design

    This paper introduces an extension of Timed Petri Nets for the modeling of synchronous electronic circuits, addressing pipeline design problems....
    Rémi Parrot, Mikaël Briday, Olivier H. Roux in Application and Theory of Petri Nets and Concurrency
    Conference paper 2021
  14. Preparing for Forensic Analysis

    This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important...
    Chapter 2024
  15. LTE-V2X Technology

    This chapter introduces LTE-V2X, the first stage of C-V2X technology. Starting with research background and V2X services requirements, we analyze key...
    Shanzhi Chen, **ling Hu, ... Hui Xu in Cellular Vehicle-to-Everything (C-V2X)
    Chapter 2023
  16. Installing Salt

    To be able to learn Salt, perhaps we are best advised to install the product, building a fine foundation for our education. In this chapter, we will...
    Andrew Mallett in Salt Open
    Chapter 2021
  17. Fault-Tolerant Circuits

    With the scaling of semiconductor process technology, the performance of modern VLSI chips improves significantly. However, the aggressive technology...
    Chapter 2023
  18. Symbolic Path-Guided Test Cases for Models with Data and Time

    This paper focuses on generating test cases from timed symbolic transition systems. At the heart of the generation process are symbolic execution...
    Boutheina Bannour, Arnault Lapitre, ... Thang Nguyen in Formal Aspects of Component Software
    Conference paper 2024
  19. Timed Non-interference Under Partial Observability and Bounded Memory

    We investigate a timed non-interference property for security systems modeled as timed automata, in which a low-security level user should not be...
    Anthony Spriet, Didier Lime, Olivier H. Roux in Formal Modeling and Analysis of Timed Systems
    Conference paper 2023
  20. Tree parity machine guided patients’ privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19

    In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the...

    Arindam Sarkar, Moumita Sarkar in Multimedia Tools and Applications
    Article 21 March 2021
Did you find what you were looking for? Share feedback.