Abstract— In this paper, we study the problem of exact emulation of two types of optical queues: (i) N-to-1 output-buffered multiplexers with variable length bursts, and (ii) N Ă...
Yi-Ting Chen, Cheng-Shang Chang, Jay Cheng, Duan-S...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
— In this paper, we describe a new approach for the extrinsic calibration of a camera with a 3D laser range finder, that can be done on the fly. This approach does not require an...
The volume of online data content has shown an un precedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data re tention and ...
NagaPramod Mandagere, Jim Diehl, David Hung-Chang ...
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...