Using a cluster of commodity Alpha processors we compare two software platforms based on Linux and Windows NT and intended to support intensive scientic computations. Networking a...
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
ct This paper willpresent the resultsof a comparative study of a set of vision-based control strategies that have been applied to the problem of steering an autonomous vehicle alon...
Jana Kosecka, Robert Blasi, Camillo J. Taylor, Jit...
Koza has shown how automatically defined functions (ADFs) can reduce computational effort in the GP paradigm. In Koza's ADF, as well as in standard GP, an improvement in a par...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...