Now showing items 1-2 of 2
Log Data Visualization
For end-to-end strong authentication and authorization solutions which generate a great amount of system information via system logs, it is important to treat, store, and visualize the interactions between the elements, ...
Robotic systems typically follow a rigid approach to task execution, in which they perform the necessary steps in a specific order, but fail when having to cope with unexpected situations. To address this issue we propose ...