If you have any problems related to the accessibility of any content (or if you want to request that a specific publication be accessible), please contact (email@example.com). We will work to respond to each request in as timely a manner as possible.
Now showing items 1-2 of 2
Log Data Visualization
For end-to-end strong authentication and authorization solutions which generate a great amount of system information via system logs, it is important to treat, store, and visualize the interactions between the elements, ...
Robotic systems typically follow a rigid approach to task execution, in which they perform the necessary steps in a specific order, but fail when having to cope with unexpected situations. To address this issue we propose ...