An approach to recommend a ranked list of developers to assist in performing software changes to a particular file is presented. The ranking is based on change expertise, experien...
In the past decade, information theory has been studied extensively in computational imaging. In particular, image matching by maximizing mutual information has been shown to yiel...
Igor Yanovsky, Paul M. Thompson, Stanley Osher, Al...
Abstract—In this paper, we present the analysis and experimental validation of a vision-aided inertial navigation algorithm for planetary landing applications. The system employs...
Anastasios I. Mourikis, Nikolas Trawny, Stergios I...
Nowadays the AFIS (Automatic fingerprint Identification system) plays more and more important roles in various applications such as access control, ATM card verification and crimi...
For wireless mobile Internet users the length of the battery life is one of the most important performance factors. The energy efficiency of the data transmission over radio is a ...
Enrico Rantala, Arto Karppanen, Seppo Granlund, Pa...