Search
Search Results
-
Key Technologies for Networked Virtual Environments
Thanks to the improvements experienced in technology during the last few years, most especially in virtual reality systems, the number and potential...
-
Material Intelligence
This chapter describes soft robots that use biological and chemical materials. The authors will introduce some attempts to regard them not only as a... -
Implementation of Microgrid Digital Twin System for Unmanned Vehicles with Cloud Computing Techniques
The digital twin (DT) has recently been forth in the rapid advancements at cloud computing and artificial intelligence (AI). It has numerous...
-
Layered Controller Synthesis for Dynamic Multi-agent Systems
In this paper we present a layered approach for multi-agent control problem, decomposed into three stages, each building upon the results of the... -
Introduction
Since the beginning of twenty-first century, engineering construction has advanced by leaps and bounds, and the scale of construction has expanded... -
Cache Memory and On-Chip Cache Architecture: A Survey
Presently, one of the most essential performance of new multicore CPUs is processing speed. Various components, including cache, are employed to... -
Max-Entropy Sampling for Deterministic Timed Automata Under Linear Duration Constraints
Adding probabilities to timed automata enables one to carry random simulation of their behaviors and provide answers with statistical guarantees to... -
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
Digital contact tracing apps allow to alert people who have been in contact with people who may be contagious. The Google/Apple Exposure Notification... -
A Low-Cost IoT Architecture Based on LPWAN and MQTT for Monitoring Water Resources in Andean Wetlands
This paper describes the development of a monitoring system for water sources in the Tres Lagunas Andean high-altitude wetlands ecosystem (Ecuador),...
-
Repairing Timed Automata Clock Guards through Abstraction and Testing
Timed automata (TAs) are a widely used formalism to specify systems having temporal requirements. However, exactly specifying the system may be... -
Winfrared: An Infrared-Like Rapid Passive Device-Free Tracking with Wi-Fi
Accurate and fast target tracking is the basis of many intelligent applications and is therefore widely discussed and researched. The existing... -
Reliability of Ring Oscillator PUFs with Reduced Helper Data
Enhancing the reliability of natively unstable Physically Unclonable Functions (PUFs) is a major requirement when the PUF is to generate secret... -
Timed Petri Nets with Reset for Pipelined Synchronous Circuit Design
This paper introduces an extension of Timed Petri Nets for the modeling of synchronous electronic circuits, addressing pipeline design problems.... -
Preparing for Forensic Analysis
This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important... -
LTE-V2X Technology
This chapter introduces LTE-V2X, the first stage of C-V2X technology. Starting with research background and V2X services requirements, we analyze key... -
Installing Salt
To be able to learn Salt, perhaps we are best advised to install the product, building a fine foundation for our education. In this chapter, we will... -
Fault-Tolerant Circuits
With the scaling of semiconductor process technology, the performance of modern VLSI chips improves significantly. However, the aggressive technology... -
Symbolic Path-Guided Test Cases for Models with Data and Time
This paper focuses on generating test cases from timed symbolic transition systems. At the heart of the generation process are symbolic execution... -
Timed Non-interference Under Partial Observability and Bounded Memory
We investigate a timed non-interference property for security systems modeled as timed automata, in which a low-security level user should not be... -
Tree parity machine guided patients’ privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19
In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the...