The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) has received more and more concerns in academia and industry since it was first proposed. With the decrease of tag price and the development of electronic equipments, IoT is widely used to manage the commodities in modern logistic warehouse. As the commodities move in and out of the warehouse frequently every day, there is a need to devise an efficient solution to detect the...
In this paper, we study pattern preserving path following control of unicycle teams with communication delays. The pattern of the vehicle team is said to be preserved if the distance between it and the desired one remains in some given range. A virtual vehicle formation is introduced such that each virtual vehicle becomes the pursuit target for the corresponding real vehicle. First, an input-driven...
The web environment creates risks together with benefits for web services. Web services often engage attacks from hackers or anyone having hostile intensions. The behavior of services is often effected by the environment changes which should be included in its specifications. In addition, services usually have some mechanisms provided by the developers to deal with the environment changes, especially...
Motivated by the famous Vicsek's model, this paper addresses the problem of heading consensus for a multi-agent group by using asynchronous decentralized algorithms. Two algorithms, one for the leaderless case and one for the leader based case are proposed. The appealing feature of both algorithms is that neither a global coordinate system nor a common clock is required. It is proved that these algorithms...
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the...
In this technical note, under widely used joint connectivity assumptions, some necessary and/or sufficient conditions for the heading consensus of autonomous multi-agent systems described by Vicsek's model are proposed. Further, more general nonaveraging protocols are studied for which necessary and/or sufficient conditions for the consensus are also given.
Special relativity can be useful for secure bit commitment when mutually mistrustful parties Alice and Bob control two separated laboratories. Kent has proposed two relativistic bit commitment protocols, RBC1 and RBC2. However, RBC1 has a severe practical problem, as its implementation requires channel capacity exponentially increasing in time. RBC2 solves the problem by combining the technique developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.