Software defects, commonly known as bugs, present a serious challenge for system reliability and dependability. Once a program failure is observed, the debugging activities to loc...
—Wireless social community networks are emerging as a new alternative to provide wireless data access in urban areas. By relying on users in the network deployment, a wireless co...
Mohammad Hossein Manshaei, Julien Freudiger, M&aac...
— In this paper, we propose an action planning algorithm and its evaluation method based on dynamic simulation for a novel type of hybrid leg-wheel rover for planetary exploratio...
Eric Rohmer, Giulio Reina, Genya Ishigami, Keiji N...
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Approximate Nearest Neighbor (ANN) methods such as Locality Sensitive Hashing, Semantic Hashing, and Spectral Hashing, provide computationally ecient procedures for nding objects...