Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
Blocking artifact is the most prevailing degradation caused by block-based DCT coding techniques under low bit-rate conditions. To alleviate blockings perceptually, it is desirabl...
Abstract— Proxy caching servers are widely deployed in today’s Internet. While cooperation among proxy caches can significantly improve a network’s resilience to denial-of-s...
Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan C...
Embedded computing architectures can be designed to meet a variety of application specific requirements. However, optimized hardware can require compiler support to realize the po...
— This paper presents a generic kinematic modeling approach for articulated multi-monocycle mobile robots. The formulation proposed to deduce the input/output velocity equations ...