Abstract. For autonomy in underwater robotics it is essential to develop context-driven controllers, capable of leading from perception to action without human intervention. One of...
Otar Akanyeti, Maria-Camilla Fiazza, Paolo Fiorini
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correc...
Abstract— The delay analysis and comparison of OFDMTDMA and OFDMA using a flow control scheme under the QoS framework of IEEE 802.16 are conducted in this work. We investigate t...
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Using eye tracking, we study the way viewers look at photos and image based NPR illustrations. Viewers examine the same number of locations in photos and in NPR images with unifor...