In this paper, we present an algorithm which automatically maps the IPs onto a generic regular Network on Chip (NoC) architecture and constructs a deadlock-free deterministic rout...
In this paper, we proposed a new edge-directed image interpolation algorithm which can preserve the edge features and natural appearance of images efficiently. In the proposed sche...
Xinfeng Zhang, Siwei Ma, Yongbing Zhang, Li Zhang,...
Outlier detection in wireless sensor networks is essential to ensure data quality, secure monitoring and reliable detection of interesting and critical events. A key challenge for...
During software development and evolution activities, the developers focus the refactoring efforts on choosing and applying refactoring patterns (or sequences of patterns) that ar...
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...