The capability of maintaining the pose of the mobile robot is central for basic navigation and map building tasks. In this paper we describe a vision-based hybrid localization sch...
We discuss a generic architecture for building user-centric systems. The characteristic feature of such systems is a control loop that monitors the user’s state, and produces a h...
Gilbert Beyer, Moritz Hammer, Christian Kroiss, An...
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...
Current peer-review software lacks intelligence for responding to students' reviewing performance. As an example of an additional intelligent assessment component to such soft...
Wenting Xiong, Diane J. Litman, Christian D. Schun...
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...