Abstract— Recent results establish the optimality of interference alignment to approach the Shannon capacity of interference networks at high SNR. However, the extent to which in...
Krishna Srikanth Gomadam, Viveck R. Cadambe, Syed ...
Abstract. We present a new application of computer vision: continuous measurement of the geometrical visibility range on inter-urban roads, solely based on a monocular image acquis...
We consider the use of so-called top-points for object retrieval. These points are based on scale-space and catastrophe theory, and are invariant under gray value scaling and offse...
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
Abstract— Redundant manipulators have some advantages when compared with classical arms because they allow the trajectory optimization, both on the free space and on the presence...